US20060248346A1 - Method for generating device unique key, secret information LSI with secret information processing function using the method, host device mounted with the LSI, recording medium with authentication function used in the host device, and portable terminal with the recording medium having authentication function - Google Patents
Method for generating device unique key, secret information LSI with secret information processing function using the method, host device mounted with the LSI, recording medium with authentication function used in the host device, and portable terminal with the recording medium having authentication function Download PDFInfo
- Publication number
- US20060248346A1 US20060248346A1 US11/377,278 US37727806A US2006248346A1 US 20060248346 A1 US20060248346 A1 US 20060248346A1 US 37727806 A US37727806 A US 37727806A US 2006248346 A1 US2006248346 A1 US 2006248346A1
- Authority
- US
- United States
- Prior art keywords
- device unique
- user
- encrypted
- host device
- generating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
Definitions
- the present invention relates to a method for generating a device unique key, a secret information LSI with a secret information processing function using the method, a host device mounted with the LSI, a recording medium with an authentication function used in the host device, and a portable terminal with the recording medium having an authentication function.
- a device unique ID including user information (user ID) such as a phone number in a system in which a device unique key is generated in accordance with the device unique ID including the user information when a host device such as a portable terminal is registered or replaced.
- the target device designates a memory card such as an SD card.
- the contents often include copyrighted ones.
- the contents cannot be copied but made usable only on the user's host device such as the portable terminal where the contents have been downloaded. Thus, the copyrights of the contents are protected.
- the host device such as the portable terminal acquires a device unique ID including a user ID such as a phone number from an external device when the host device is registered or replaced.
- a device unique key is generated from the device unique ID.
- the contents are encrypted with the device unique key so that the contents can be used only on the user's host device such as the portable terminal where the contents have been downloaded. Thus, the copyrights of the contents are protected.
- JP-A-2002-342168 discloses a method for transferring data between host devices such as portable terminals while securing copyright protection of data stored in the host devices such as the portable terminals.
- a host device such as a portable terminal acquires a device unique ID including a user ID such as a phone number from an external device when the host device is shipped or replaced.
- the method has a problem that it is difficult to protect the device unique ID or deal with an illegal access.
- the present invention was developed in consideration of the foregoing situation. It is an object of the invention to provide a method for generating a device unique key to thereby establish a system for protecting a device unique ID including a user ID such as a phone number acquired from an external device when a host device such as a portable terminal is shipped or replaced, a secret information LSI with a secret information processing function using the method, a host device mounted with the LSI, a recording medium with an authentication function used in the host device, and a portable terminal with the recording medium having an authentication function.
- a user ID such as a phone number acquired from an external device when a host device such as a portable terminal is shipped or replaced
- a secret information LSI with a secret information processing function using the method
- a host device mounted with the LSI a recording medium with an authentication function used in the host device
- a portable terminal with the recording medium having an authentication function.
- a method for generating a device unique key includes the steps of: integrating a fixed ID and a user ID to thereby generate a device unique ID, the fixed ID being determined for a host device in advance and stored in a storage portion of the host device, the user ID being able to be determined desirably by a user; and generating a device unique key based on the device unique ID.
- a fixed ID determined for a host device in advance and a user ID which can be determined desirably by a user are integrated to generate a device unique ID. Due to the device unique ID generated newly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- the method for generating a device unique key further includes the steps of: making a key generator of a key management mechanism encrypt the fixed ID to thereby generate an encrypted fixed ID; making a secret information processing portion of the host device decrypt the encrypted fixed ID and store the decrypted fixed ID as the fixed ID into the storage portion of the host device; making an I/F of the host device acquire the user ID the user can determine desirably; and making the secret information processing portion of the host device integrate the fixed ID and the user ID to thereby generate a device unique ID.
- a device unique key is generated based on an encrypted device unique ID obtained by encrypting a device unique ID. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- the method for generating a device unique key according to the invention includes a method in which the step of generating the device unique ID includes the steps of: generating change field information defining a field of the device unique ID in which the user ID should be input; and making the host device input the user ID into a desired field of the device unique ID in accordance with the change field information so as to integrate the user ID with the fixed ID to thereby generate the device unique ID.
- the method for generating a device unique key according to the invention includes a method including the step of setting the user ID in the desired field based on the change field information and then making the secret information processing portion of the host device integrate the user ID with the fixed ID so as to generate the device unique ID.
- a device unique ID is generated based on change field information defining a field of the device unique ID in which the user ID should be input. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- the method for generating a device unique key includes a method further including the steps of: making the secret information processing portion of the host device encrypt the device unique ID to thereby generate an encrypted device unique ID; storing the encrypted device unique ID into the storage portion of the host device; and making the secret information processing portion of the host device generate a device unique key based on the device unique ID.
- an encrypted device unique ID is generated and stored in the storage portion as it is.
- the encrypted device unique ID is decrypted, and a device unique key is generated based on the decrypted device unique ID. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented. That is, when mutual authentication is established between the target device and the host device, an authentication key can be obtained.
- the device unique ID is bound with the authentication key so that a device unique key is generated.
- the binding may be performed so that the authentication key is encrypted with the device unique ID, or a logical product is obtained between the device unique ID and the authentication key. In short, it is essential to associate the device unique ID with the authentication key to thereby obtain a device unique key.
- the method for generating a device unique key includes a method further including the steps of: making the secret information processing portion of the host device generate an authentication key based on mutual authentication between the host device and a target device; and making the secret information processing portion of the host device generate a device unique key based on the device unique ID and using the authentication key generated in the step of generating the authentication key.
- an authentication key is generated based on mutual authentication between the host device and the target device.
- the mutual authentication is not established, a subsequent device unique ID generating process cannot be executed. Accordingly, illegal access from an unauthorized host device can be prevented.
- the method for generating a device unique key includes a method further including the steps of: making the key generator of the key management mechanism encrypt the change field information to thereby generate encrypted change field information, and store the encrypted change field information into the host device; and making the secret information processing portion of the host device acquire the encrypted change field information and decrypt the change field information.
- change field information is encrypted with a key so as to generate an encrypted change field information, while the encrypted change field information is decrypted with the key so as to acquire the change field information. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- the method for generating a device unique key according to the invention includes a method further including the step of making an external device I/F of the host device acquire the change field information from the external device.
- the host device acquires change field information from the external device. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- the method for generating a device unique key according to the invention includes a method in which the step of acquiring the change field information is a step of acquiring the change field information as encrypted change field information.
- the host device acquires change field information from the external device in the form of encrypted change field information. Accordingly, protection can be further enhanced, and illegal access can be prevented.
- the method for generating a device unique key according to the invention includes a method further including the step of calculating a hash value of the change field information.
- a hash value of the change field information is calculated in the host device, and a hash value of the change field information is calculated in the key management mechanism or the like in advance and input to the host device, the hash values are compared in a comparison circuit.
- an abnormal termination process such as reset or suspension of a processing circuit is performed. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- the method for generating a device unique key according to the invention includes a method in which the change field information is plain text.
- the change field information is stored as plain text. Accordingly, confidentialty is poor but management is easy.
- the change field information is plain text, it is desired from the point of view of confidentially that the change field information is stored, for example, in the secret information processing portion of the host device.
- the method for generating a device unique key includes a method further including the step of making an external device I/F of the host device acquire the user ID from an external device when the device unique ID is registered, exchanged, updated or changed.
- the user ID is acquired from the external device when the device unique ID is registered, exchanged, updated or changed. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- the method for generating a device unique key according to the invention includes a method in which the step of acquiring the user ID is a step of acquiring the user ID as an encrypted user ID.
- the host device acquires the user ID as an encrypted user ID from the external device. Accordingly, protection can be further enhanced, and illegal access can be prevented.
- the method for generating a device unique key according to the invention includes a method further including the step of calculating a hash value of the user ID.
- a hash value of the user ID is calculated in the host device, and compared with a stored hash value calculated in the host device or the like by a comparison circuit.
- an abnormal termination process such as reset or suspension of a processing circuit is performed. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- the method for generating a device unique key according to the invention includes a method in which the user ID is plain text.
- the user ID is stored as plain text. Accordingly, confidentially is poor but management is easy.
- the user ID is plain text, it is desired from the point of view of confidentialty that the user ID is stored, for example, in the secret information processing portion of the host device.
- the method for generating a device unique key includes a method further including the step of making a secret information processing portion of the host device judge the number of times with which the device unique ID has been changed, and update the device unique ID as long as the number of times with which the device unique ID has been changed is not larger than a predetermined number.
- the number of times with which the device unique ID has been changed is determined.
- the device unique ID is updated. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- the method for generating a device unique key according to the invention includes a method further including the step of making the host device generate an authentication key from information stored in the host device and information stored in the target device.
- the method for generating a device unique key includes a method in which the host device stores initial-value of the user ID, and it is determined whether the initial-value of the user ID coincides with a user ID portion obtained by a secret information processing portion of the host device decrypting an encrypted fixed ID stored by the host device, or not.
- initial-value of the user ID is stored and compared with a user ID in each case. Accordingly, illegal access can be prevented more surely.
- the method for generating a device unique key includes a method further including the step of making a secret information processing portion of the host device encrypt the device unique ID to thereby generate an encrypted device unique ID, and outputting the encrypted device unique ID.
- the encrypted device unique ID is encrypted. Accordingly, even when the encrypted device unique ID is stored outside the secret information processing portion, confidentialty can be secured. Accordingly, falsification of the device unique ID or illegal access can be prevented.
- the method for generating a device unique key includes a method in which the host device stores initial-value of the user ID; and it is determined whether a user ID obtained by decrypting and then separating the encrypted device unique ID input again into the secret information processing portion coincides with the initial value of the user ID stored by the host device in advance, or not.
- authentication can be performed more easily and more surely.
- the method for generating a device unique key includes a method further including the steps of: making a secret information processing portion of the host device encrypt the device unique ID to thereby generate an encrypted device unique ID; making the secret information processing portion of the host device decrypt an encrypted device unique ID to thereby generate a device unique ID, the encrypted device unique ID being input from the storage portion of the host device through an I/F of the host device; and comparing a user ID input from the outside of the host device through the I/F with a user ID portion of the decrypted device unique ID, and regarding the input user ID as unauthorized and suspending a subsequent encryption/decryption process when the input user ID does not coincide with the user ID portion of the decrypted device unique ID.
- illegality can be found in an early stage.
- the method for generating a device unique key includes a method further including the steps of: making a key generator of a key management mechanism add a determination flag region and encrypt the fixed ID to thereby generate an encrypted fixed ID; making a secret information processing portion of the host device integrate the fixed ID with the user ID and update the determination flag region to thereby generate a device unique ID; and generating a device unique key based on the device unique ID.
- the method for generating a device unique key includes a method further including the steps of: determining whether the determination flag region has been updated or not; and regarding the determination flag region as unauthorized and suspending processing when the determination flag region has not been updated.
- illegality can be found in an early stage.
- the method for generating a device unique key according to the invention includes a method in which the storage portion is disposed in a secret information processing portion.
- the method for generating a device unique key includes a method in which the storage portion is disposed in the host device but out of a secret information processing portion of the host device.
- the method for generating a device unique key according to the invention includes a method in which the user ID is encrypted, and input as an encrypted user ID to the secret information processing portion of the host device.
- the user ID can be hidden. Accordingly, security can be further enhanced.
- a device unique ID according to the invention includes: a fixed ID determined for a host device in advance; and a user ID a user can determine desirably; wherein the fixed ID and the user ID are integrated with each other whenever the user ID is used so that the device unique ID has a data structure which can be changed whenever the device unique ID is used.
- the device unique ID includes a device unique ID having a data structure in which the fixed ID and the user ID are integrated based on change field information defining a field of the device unique ID the user ID should be input into.
- a secret information LSI includes a secret information processing portion for generating a device unique ID; wherein the device unique ID has a data structure in which a fixed ID determined for a host device in advance and a user ID a user can determine desirably whenever the user ID is used are integrated with each other so that the data structure can be changed whenever the device unique ID is used.
- the secret information LSI includes a secret information LSI in which the secret information processing portion integrates the fixed ID with the user ID based on change field information so as to generate the device unique ID, the change field information defining a field of the device unique ID the user ID should be input into.
- the secret information LSI has a secret information processing function in which the fixed ID determined for the host device in advance and the user ID the user can determine desirably are integrated, and a device unique ID is generated based on the change field information. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- a host device includes the secret information LSI.
- the host device includes a host device further including: a decryption circuit for decrypting an encrypted fixed ID; a storage portion for storing the decrypted fixed ID; an I/F for inputting the user ID the user can determine desirably; and a secret information processing portion by which the fixed ID is read from the storage portion, and the fixed ID and the user ID input through the I/F are integrated to generate a device unique ID.
- the host device includes a host device further including an encryption circuit for encrypting the device unique ID to thereby generate an encrypted device unique ID.
- the host device includes a host device further including an authentication key generating circuit for generating an authentication key based on mutual authentication between the host device and the target device.
- the LSI according to the invention includes an LSI further including a storage area for storing encrypted change field information.
- the host device includes a host device further including an external device I/F through which the user ID can be acquired from an external device when the device unique ID is registered, replaced, updated or changed.
- the host device includes a host device further including an external device I/F through which the change field information can be input from the external device.
- the host device includes a host device further including a determination circuit for determining the number of times with which the device unique ID has been changed.
- a recording medium according to the invention is a recording medium with an authentication function used in the host device.
- a portable terminal having a recording medium according to the invention includes a secret information processing function and an authentication function.
- a fixed ID determined for the host device in advance and a user ID the user can determine desirably are integrated, and a device unique ID is generated based on change field information. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- a database according to the invention accumulates contents distributed by the contents distributing method. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- the user in this document means not a final customer but a maker manufacturing host devices or a shop selling or registering the host devices.
- the encryption/decryption in the invention includes both encryption/decryption using a secret key system and a public key system.
- a secret key is used as a key.
- a fixed ID determined before a host device such as a portable terminal is shipped or replaced is, for example, encrypted in advance and stored in the host device such as the portable terminal.
- a user ID such as a phone number
- the fixed ID and the user ID are integrated so that a new device unique ID is generated.
- a new device unique ID can be generated whenever a user ID is registered.
- a device unique key is generated based on the device unique ID. Accordingly, protectability of the device unique ID can be enhanced, and illegal access can be prevented.
- FIG. 1 is a block diagram showing the overall configuration of a device unique ID changing system.
- FIG. 2 is a block diagram showing the overall configuration of the system, focusing on a data flow therein according to Example 1.
- FIG. 3 is a flow chart.
- FIGS. 4A to 4 D are diagrams showing configurations of a device unique ID.
- FIG. 5 is a data flow among a host device, a target device and an external device in the flow chart of FIG. 3 .
- FIG. 6 is a chart showing a data flow of an encrypted device unique ID generating process 207 in the flow chart of FIG. 3 (where change field information is stored in the host device).
- FIG. 7 is a chart showing a data flow of the encrypted device unique ID generating process 207 (Example 2) in the flow chart of FIG. 3 (where change field information and a hash value are stored in the host device).
- FIG. 8 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 2 of the invention.
- FIG. 9 is a data flow of the encrypted device unique ID generating process 207 (Example 3) in the flow chart of FIG. 3 (where change field information is stored and encrypted in the host device).
- FIG. 10 is a chart showing a data flow of the encrypted device unique ID generating process 207 (Example 4) in the flow chart of FIG. 3 (where change field information is acquired from the external device).
- FIG. 11 is a data flow of the encrypted device unique ID generating process 207 (Example 5) in the flow chart of FIG. 3 (where change field information is acquired from the external device, a hash value of the change field information is also acquired from the outside, and falsification of the change field information is detected).
- FIG. 12 is a data flow of the encrypted device unique ID generating process 207 (Example 6) in the flow chart of FIG. 3 (where encrypted change field information is acquired from the external device).
- FIG. 13 is a data flow of the encrypted device unique ID generating process 207 (Example 7) in the flow chart of FIG. 3 (where a hash value of a user ID is acquired from the outside and falsification of the user ID is detected).
- FIG. 14 is a data flow of the encrypted device unique ID generating process 207 (Example 8) in the flow chart of FIG. 3 (where an encrypted user ID is acquired from the external device).
- FIG. 15 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 8 of the invention.
- FIG. 16 is a data flow of the encrypted device unique ID generating process 207 (Example 9) in the flow chart of FIG. 3 (where the number of times of update is controlled).
- FIG. 17 is a data flow of a device unique key generating process 206 (Example 10) in the flow chart of FIG. 3 .
- FIG. 18 is a block diagram showing a block configuration for contents distribution.
- FIG. 19 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 11 of the invention.
- FIG. 20 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 12 of the invention.
- FIG. 21 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 13 of the invention.
- FIGS. 22A to 22 D are diagrams showing configurations of a device unique ID according to Embodiment 3 of the invention.
- FIG. 23 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 14 of the invention.
- Embodiment 1 which is the best mode for carrying out the invention will be described below.
- a device unique key generating system as an embodiment of the invention will be described.
- FIG. 1 shows the overall configuration of a device unique ID changing system constituted by a host device, a target device and an external device.
- FIG. 2 shows the overall configuration of an example of this system (corresponding to undermentioned Example 1), focusing on a data flow therein.
- the target device 101 is a memory card represented by an SD card.
- a host device intends to change a device unique ID
- the target device 101 performs an authentication process between the target device and the host device.
- the target device 101 fails in authentication, the target device 101 is not allowed to generate a key (secret key) serving as an authentication key for decrypting secret information encrypted in advance.
- the encrypted secret information can be prevented from being decrypted in an unauthorized host device.
- the host device 102 is a host device of a portable terminal represented by a portable phone.
- the host device 102 includes an internal bus 109 , a secret information processing portion 105 for encrypting/decrypting secret information in accordance with a predetermined sequence, a host CPU 106 for activating the predetermined sequence for the secret information processing portion 105 , a target I/F portion 104 for inputting/outputting data between the host CPU 106 and the target device 101 , a host I/F portion 107 for inputting/outputting data between the host CPU 106 and the secret information processing portion 105 , an RAM 108 serving as a work area for the host CPU 106 and the secret information processing portion 105 to temporarily store data required for their operation, a nonvolatile memory (FLASH) 110 for storing secret information encrypted in advance, and an external I/F portion 112 to be connected to the external device 103 .
- FLASH nonvolatile memory
- the external device 103 is an information management system such as a server.
- the external device 103 connected to the host device 102 inputs a user ID to the host device 102 .
- the host device 102 has to perform authentication between the target device 101 and the host device 102 .
- a key management mechanism 121 is also provided in the external device 103 .
- a key generator 120 encrypts a device unique ID (ID 0 ) with a key K 1 to thereby generate an encrypted device unique ID (ID 1 ).
- the device unique ID (ID 0 ) is constituted by a fixed ID portion (ID F ) and a variable ID information portion (ID c0 ).
- the key management mechanism 121 is designed to give key information to a key K 2 of the secret information LSI 111 of the host device 102 in advance.
- the key information serves to decrypt this encrypted device unique ID (ID 1 ).
- a decryption circuit 113 decrypts the encrypted device unique ID (ID 1 ) with the key K 2 so as to acquire the device unique ID (ID 0 ) constituted by the fixed ID portion (ID F ) and the variable ID information portion (ID c0 ).
- a separation circuit 114 separates this device unique ID into the fixed ID portion (ID F ) and the variable ID information portion (ID c0 ).
- the separation circuit 114 extracts only the fixed ID portion (ID F ) while leaving behind the variable ID information portion (ID c0 ) entirely filled with “0”. Further, the encrypted device unique ID (SID) output from the secret information LSI is input into the secret information LSI again and decrypted by a decryption circuit 118 .
- the host device 102 reads secret information from the target device 101 through the target I/F portion 104 .
- the host device 102 uses the secret information decrypted by the secret information processing portion 105 .
- the secret information processing portion 105 is activated to operate by the host CPU 106 , the secret information processing portion 105 is hidden hardware.
- the secret information processing portion 105 performs only a predetermined sequence in which security is secured or less security is required.
- an integration circuit 115 integrates change field information IF, a user ID (ID u1 ) and the fixed ID portion (ID F ) to thereby form a device unique ID (ID 1 ).
- the change field information I F is built in the host device 102 in advance.
- the user ID (ID u1 ) is input from the external device 103 through the external I/F portion 112 .
- the fixed ID portion (ID F ) is extracted by the separation circuit 114 .
- the device unique ID (ID 1 ) obtained thus is encrypted with a key K 3 so that an encrypted device unique ID (SID 1 ) is obtained.
- the encrypted device unique ID (SID 1 ) obtained thus is decrypted with a key K 4 again by the decryption circuit 118 so that a device unique key (device unique secret key) KI is generated by a device unique key generation processing circuit 117 again.
- the reference numeral 119 designates an encryption/decryption processing control circuit.
- Examples of the host device 102 include communicatable portable music player/portable audio player serving as a portable terminal, a network connected portable game machine and a portable phone.
- Examples of the target device 101 include a memory card (SD card) with an authenticatable copyright protection function, a DVD (DVDRAM) with a copyright protection function and a hard disk with a copyright protection function.
- Examples of the external device 103 include an information management system such as a server and a phone number registration machine.
- FIG. 3 is a flow chart of a process for acquiring a user ID from the external device, updating a device unique ID, and generating a device unique secret key in the device unique ID changing system shown in FIGS. 1 and 2 .
- a mutual authentication processing step 201 between the host device and the target device it is determined whether the host device is an unauthorized device or not.
- an encrypted fixed ID is decrypted with a key (K 2 in FIG. 2 ) in an encrypted fixed ID decryption processing step 202 .
- the mutual authentication is unsuccessful, the sequence is terminated abnormally.
- This change field information processing step 203 is a process for handing over designated change field information to a device unique ID generating step 205 .
- a user ID externally acquiring step 204 a user ID is acquired from the external device and stored in the host device 102 .
- the device unique ID generating step 205 the pieces of information obtained in the encrypted fixed ID decryption processing step 202 , the change field information processing step 203 and the user ID externally acquiring step 204 are integrated so that a device unique ID is generated.
- a device unique secret key is generated in a device unique secret key generating step 206 using the device unique ID generated in the device unique ID generating step 205 .
- This secret key will be used as a key for hiding information.
- the keys K 1 to K 4 shown in FIG. 2 may be all the same. Alternatively, different keys may be used for a set of the k eys K 1 and K 2 and a set of the keys K 3 and K 4 respectively.
- An authentication key Ks and a device unique key KI are updated and changed whenever processing is performed.
- FIGS. 4A to 4 D are explanatory diagrams showing configurations of the device unique ID and the change field information.
- the device unique ID is roughly constituted by two IDs, that is, a fixed ID 301 and a user ID 302 .
- the fixed ID 301 is secret information determined before the host device is registered or replaced.
- the user ID is user-dependent information such as a phone number.
- the user ID is an ID which can be changed when the host device is registered or replaced.
- a device unique ID before registration of a user ID has a configuration in which a fixed ID 301 and a user ID 303 are encrypted.
- the field of the user ID 303 set at the time of registration is defined as “0”.
- the device unique ID after registration of the user ID has a configuration in which the fixed ID 301 and a user ID 304 are encrypted.
- Change field information defines a field of the device unique ID in which the user ID should be put.
- fields of the device unique ID are formed to indicate a start point and an end point of the user ID.
- the change field information is (a, b).
- the same data as the fixed ID may be placed repeatedly before and after the user ID or the user ID may be inserted into the field of the fixed ID.
- FIG. 5 shows a data flow among the host device, the target device and the external device in the flow chart of FIG. 3 .
- An authentication processing step 401 is performed between the host device and the target device.
- an authentication key 402 which will be required in a device unique secret key generating step 408 is generated in the secret information processing portion 105 in FIG. 1 .
- the mutual authentication is unsuccessful so that the host device is regarded as unauthorized, the sequence is terminated abnormally.
- the host device generates a device unique ID from an encrypted fixed ID 403 acquired internally from the host device and a user ID 405 acquired from the external device, and encrypts the device unique ID with a key so as to generate an encrypted device unique ID (encrypted device unique ID generating step 406 ).
- This encrypted device unique ID is stored in a storage portion of the host device.
- the encrypted device unique ID is decrypted with a key 404 by the secret information processing portion of the host device so that a device unique secret key is generated by use of the authentication key 402 (Step 408 ). Then, this device unique key (device unique secret key) 409 is stored in the host device.
- FIG. 6 shows data flow ( 1 ) of Example 1 of an encrypted device unique ID generating process 207 in the flow chart of FIG. 3 .
- FIG. 6 represents a method for acquiring only a user ID from the external device while providing change field information in the host device in advance. The overall configuration of this system is illustrated in detail in FIG. 2 .
- the host device 102 has an encrypted fixed ID and a key ( 502 ) for decrypting the encrypted fixed ID.
- the host device retrieve the encrypted fixed ID stored in the FLASH 110 in FIG. 1
- the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted fixed ID with the key so as to obtain a fixed ID.
- the fixed ID obtained thus is integrated with change field information acquired from the host device and a user ID acquired from the external device so that a device unique ID is generated. This device unique ID is stored in the secret information processing portion 105 of the host device.
- the change field information is plain text, the change field information is stored in the secret information processing portion 105 in the secret information LSI 111 in FIG. 1 .
- the generated device unique ID and a device unique ID generating flag are stored in the secret information processing portion 105 .
- the generated device unique ID is encrypted with a key by the secret information processing portion 105 in FIG. 1 so that an encrypted device unique ID is obtained.
- the encrypted device unique ID obtained thus is stored in the FLASH 110 .
- the key 502 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 502 used to encrypt the device unique ID.
- the fixed ID or the change field information does not have to be encrypted as long as access thereto from any unauthorized external device or the like can be blocked.
- the key 502 , the fixed ID 503 , the change field information 504 , the device unique ID 507 and the device unique ID generating flag 509 are stored in the secret information processing portion 105 .
- the encrypted fixed ID 501 , the change field information 504 and the encrypted device unique ID 508 are stored in the FLASH 110 .
- the user ID 505 acquired from the external device is stored in the RAM 108 .
- the encrypted fixed ID 501 and the key 502 are acquired, and the encrypted fixed ID is decrypted with this key so that the fixed ID 503 is obtained.
- the change field information 504 is taken out, and the decrypted fixed ID obtained in Step 503 , the change field information 504 and the user ID 505 acquired from the external device are integrated (Step 506 ).
- the device unique ID 507 is generated and the device unique ID generating flag 509 is generated.
- the device unique ID 507 is encrypted with the key 502 by the host device so that the encrypted device unique ID is obtained (Step 508 ).
- This encrypted device unique ID is stored in the host device.
- the encrypted fixed ID, the change field information and the encrypted device unique ID are stored in the FLASH 110 .
- the user ID 505 acquired from the external device is stored in the RAM 108 .
- the change field information may be stored in the secret information LSI.
- FIG. 7 shows a data flow (Example 2) of the encrypted device unique ID generating process 207 in the flow chart of FIG. 3 .
- FIG. 7 represents a method for acquiring only a user ID from the external device while providing change field information and a hash value in the host device in advance.
- the overall configuration of this system is illustrated in detail in FIG. 8 .
- FIG. 8 is the same as the block diagram of the overall configuration ( FIG. 2 ) of the system used in Example 1, except that a hash calculator 122 is provided in the key management mechanism 121 .
- the change field information is stored as raw data in the storage portion (FLASH 110 ) of the host device.
- a hash value H F ( 605 ) generated by the hash calculator 122 of the key management mechanism 121 is embedded in the host device.
- the hash value H F ( 605 ) is compared with a hash value H 0 ( 607 ) calculated from the change field information stored in the FLASH 110 (comparison step 608 ).
- a hash value H 0 ( 607 ) calculated from the change field information stored in the FLASH 110 (comparison step 608 ).
- the host device decrypts an encrypted fixed ID 601 with a key K 2 ( 602 ).
- a hash value H F ( 605 ) of change field information 604 is calculated by the hash calculator 122 provided in the key management mechanism 121 , and stored in the storage portion of the host device.
- a hash value H 0 ( 607 ) calculated from plain text of the change field information stored in the FLASH 110 is compared with the hash value calculated in the key management mechanism 121 . Thus, it is checked whether the change field information has been falsified or not.
- the host device reads an encrypted fixed ID stored in the FLASH 110 in FIG. 1 , and uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted fixed ID with a key so as to obtain a fixed ID.
- the fixed ID obtained thus is stored in the secret information processing portion.
- the host device has the key 602 used to decrypt the encrypted fixed ID 601 stored in the host device and to encrypt a device unique ID 611 , the raw change field information 604 , and the hash value 605 calculated in the key management mechanism 121 in advance.
- the secret information processing portion 105 in FIG. 1 decrypts the encrypted fixed ID 601 with the key 602 so as to obtain a fixed ID 603 .
- the host device stores the fixed ID 603 in the secret information processing portion 105 .
- the encrypted fixed ID 601 stored in the FLASH 110 in advance is read.
- the encrypted fixed ID 601 is decrypted with the key 602 by the secret information processing portion 105 in FIG. 1 .
- the fixed ID 603 is obtained.
- the host device calculates the hash value 607 from the change field information 604 stored in the storage portion of the host device.
- the host device compares the aforementioned hash value 605 with the hash value 607 in a hash value comparing step 608 .
- the host device stores the change field information 604 in the secret information processing portion 105 .
- the sequence is terminated abnormally.
- the host device acquires a user ID 609 from the external device 103 in FIG. 1 and stores the user ID 609 in the RAM 108 .
- the host device uses the secret information processing portion 105 in FIG. 1 not only to generate a device unique ID 611 from the decrypted fixed ID 603 , the change field information 604 stored in the secret information processing portion 105 and the user ID 609 , but also to generate a device unique ID generating flag 613 .
- the host device stores the generated device unique ID 611 and the generated device unique ID generating flag 613 in the secret information processing portion 105 .
- the host device uses the secret information processing portion 105 in FIG. 1 to encrypt the generated device unique ID 611 with the key 602 so as to obtain an encrypted device unique ID 612 .
- the encrypted device unique ID 612 obtained thus is stored in the FLASH 110 .
- the key 602 used to decrypt the encrypted fixed ID does not have to be the same as the key 602 used to encrypt the device unique ID.
- the fixed ID or the change field information does not have to be encrypted as long as access thereto from any unauthorized external device or the like can be blocked.
- the key 602 , the fixed ID 603 , the change field information 604 , the device unique ID 611 and the device unique ID generating flag 613 are stored in the secret information processing portion 105 .
- the encrypted fixed ID 601 , the change field information 604 , the hash value 605 and the encrypted device unique ID 612 are stored in the FLASH 110 .
- the user ID 609 acquired from the external device is stored in the RAM 108 .
- the encrypted device unique ID generating process in this Example only the user ID is input from the external device while the change field information and the hash value are stored in the host device in advance. Thus, procedure and management are simplified. In addition, when the change field information is falsified from the outside such as an external device, the falsification can be detected.
- FIG. 9 shows a data flow (Example 3) of the encrypted device unique ID generating process 207 in the flow chart of FIG. 3 .
- FIG. 9 represents a method for acquiring only a user ID from the external device while providing encrypted change field information in the host device in advance.
- the host device has an encrypted fixed ID 701 , encrypted change field information 704 , and a key 702 for decrypting the encrypted fixed ID and the encrypted change field information.
- the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted fixed ID 701 with the key 702 so as to obtain a fixed ID 703 .
- the fixed ID 703 obtained thus is stored in the secret information processing portion 105 .
- the host device When the host device then reads the encrypted change field information 704 stored in the FLASH 110 in FIG. 1 , the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted change field information 704 with the key 702 so as to obtain change field information 705 .
- the change field information 705 obtained thus is stored in the secret information processing portion 105 .
- the host device acquires a user ID 706 from the external device 103 in FIG. 1 and stores the user ID 706 in the FLASH 110 .
- An integration processing step 707 is executed by the secret information processing portion 105 in FIG. 1 so that a device unique ID 708 and a device unique ID generating flag 710 are generated from the fixed ID 703 , the change field information 705 and the user ID 706 .
- the device unique ID 708 and the device unique ID generating flag 710 generated thus are stored in the secret information processing portion 105 .
- the host device uses the secret information processing portion 105 in FIG. 1 to encrypt the generated device unique ID 708 with the key 702 so as to obtain an encrypted device unique ID 709 .
- the key 702 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 702 used to encrypt the device unique ID.
- the fixed ID or the change field information does not have to be encrypted as long as access thereto from any unauthorized external device or the like can be blocked.
- the key 702 , the fixed ID 703 , the change field information 705 , the device unique ID 708 and the device unique ID generating flag 710 are stored in the secret information processing portion 105 .
- the encrypted fixed ID 701 , the encrypted change field information 704 and the encrypted device unique ID 709 are stored in the FLASH 110 .
- the user ID 706 acquired from the external device is stored in the RAM 108 .
- the encrypted device unique ID generating process in this Example only the user ID is input from the external device while the encrypted change field information is provided in the host device in advance. Thus, procedure and management are simplified. In addition, even if the encrypted change field information can be read from the outside such as an external device, the change field information can be prevented from being browsed because the change field information is encrypted.
- FIG. 10 shows a data flow (Example 4) of the encrypted device unique ID generating process 207 in the flow chart of FIG. 3 .
- FIG. 10 represents a method for acquiring change field information and a user ID from the external device.
- the host device has a key 802 for decrypting an encrypted fixed ID 801 and encrypting a device unique ID.
- the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted fixed ID 801 with the key 802 so as to obtain a fixed ID 803 .
- the fixed ID 803 obtained thus is stored in the secret information processing portion 105 .
- the host device acquires change field information 804 and a user ID 805 from the external device 103 in FIG. 1 and stores them in the FLASH 110 .
- the host device uses the secret information processing portion 105 in FIG. 1 to generate a device unique ID 807 and a device unique ID generating flag 809 from the fixed ID 803 , the change field information 804 and the user ID 805 .
- the device unique ID 807 and the device unique ID generating flag 809 generated thus are stored in the secret information processing portion 105 .
- the host device uses the secret information processing portion 105 in FIG. 1 to encrypt the generated device unique ID 807 with the key 802 so as to obtain an encrypted device unique ID 808 .
- the encrypted device unique ID 808 obtained thus is stored in the FLASH 110 .
- the key 802 used to decrypt the encrypted fixed ID does not have to be the same as the key 802 used to encrypt the device unique ID.
- the keys 802 , the fixed ID 803 , the change field information 804 , the device unique ID 807 and the device unique ID generating flag 809 are stored in the secret information processing portion 105 .
- the encrypted fixed ID 801 and the encrypted device unique ID 808 are stored in the FLASH 110 .
- the user ID 805 acquired from the external device and the change field information 804 acquired from the external device are stored in the RAM 108 .
- the change field information can be set from the external device effectively, for example, in setting a plurality of user IDs.
- FIG. 11 shows a data flow (Example 5) of the encrypted device unique ID generating process 207 in the flow chart of FIG. 3 .
- FIG. 11 represents a method for acquiring change field information, a hash value of the change field information and a user ID from the external device.
- the host device has a key 902 for decrypting an encrypted fixed ID 901 and encrypting a device unique ID.
- the key 902 is also used for encryption as will be described later.
- the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted fixed ID 901 with the key 902 so as to obtain a fixed ID 903 .
- the fixed ID 903 obtained thus is stored in the secret information processing portion 105 .
- the host device acquires change field information 904 and a hash value 905 of the change field information from the external device 103 .
- the host device calculates a hash value 907 .
- the host device compares the hash value 907 with the hash value 905 acquired from the external device.
- the host device stores the change field information 904 in the secret information processing portion 105 in FIG. 1 .
- the sequence is terminated abnormally.
- the host device acquires a user ID 909 from the external device 103 and stores the user ID 909 in the RAM 108 .
- the host device uses the secret information processing portion 105 in FIG. 1 to generate a device unique ID 911 and a device unique ID generating flag 913 from the fixed ID 903 , the change field information 904 and the user ID 909 .
- the device unique ID 911 and the device unique ID generating flag 913 generated thus are stored in the secret information processing portion 105 .
- the host device uses the secret information processing portion 105 in FIG. 1 to encrypt the generated device unique ID 911 with the key 902 so as to obtain an encrypted device unique ID 912 .
- the encrypted device unique ID 912 obtained thus is stored in the FLASH 110 .
- the key 902 used to decrypt the encrypted fixed ID does not have to be the same as the key 902 used to encrypt the device unique ID.
- the key 902 , the fixed ID 903 , the change field information 904 regarded as not falsified, the hash value 907 , the device unique ID 911 and the device unique ID generating flag 913 are stored in the secret information processing portion 105 .
- the encrypted fixed ID 901 and the encrypted device unique ID 912 are stored in the FLASH 110 .
- the user ID 909 acquired from the external device, the change field information 904 acquired from the external device and the hash value 905 of the change field information 904 acquired from the external device are stored in the RAM 108 .
- the change field information and the hash value of the change field information are acquired from the external device. It is therefore possible to detect falsification of the change field information.
- FIG. 12 shows a data flow (Example 6) of the encrypted device unique ID generating process 207 in the flow chart of FIG. 3 .
- FIG. 12 represents a method for acquiring encrypted change field information and a user ID from the external device.
- the host device has an encrypted fixed ID 1001 , and a key 1002 used to decrypt the encrypted fixed ID and encrypted change field information and to encrypt a device unique ID 1008 .
- the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted fixed ID 1001 with the key 1002 so as to obtain a fixed ID 1003 .
- the fixed ID 1003 obtained thus is stored in the secret information processing portion 105 .
- the host device acquires encrypted change field information 1004 from the external device 103 and stores the encrypted change field information 1004 in the RAM 108 .
- the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted change field information 1004 with the key 1002 so as to obtain change field information 1005 .
- the change field information 1005 obtained thus is stored in the secret information processing portion 105 .
- the host device acquires a user ID 1006 from the external device 103 and stores the user ID 1006 in the RAM 108 .
- the host device uses the secret information processing portion 105 in FIG. 1 to generate a device unique ID 1008 and a device unique ID generating flag 1010 from the fixed ID 1003 , the change field information 1005 and the user ID 1006 .
- the device unique ID 1008 and the device unique ID generating flag 1010 generated thus are stored in the secret information processing portion 105 .
- the host device uses the secret information processing portion 105 in FIG. 1 to encrypt the generated device unique ID 1008 with the key 1002 so as to obtain an encrypted device unique ID 1009 .
- the encrypted device unique ID 1009 obtained thus is stored in the FLASH 110 .
- the key 1002 used to decrypt the encrypted fixed ID does not have to be the same as the key 1002 used to encrypt the device unique ID. Further, the key used to decrypt the encrypted fixed ID, the key used to encrypt the device unique ID and the key used to decrypt the encrypted change field information may be totally different from one another.
- the key 1002 , the fixed ID 1003 , the change field information 1005 , the device unique ID 1008 and the device unique ID generating flag 1010 are stored in the secret information processing portion 105 .
- the encrypted fixed ID 1001 and the encrypted device unique ID 1009 are stored in the FLASH 110 .
- the user ID 1006 acquired from the external device and the encrypted change field information 1004 acquired from the external device are stored in the RAM 108 .
- the encrypted change field information and the user ID are acquired from the external device. It is therefore possible to hide the change field information.
- FIG. 13 shows a data flow (Example 7) of the encrypted device unique ID generating process 207 in the flow chart of FIG. 3 .
- FIG. 13 represents a method for acquiring a user ID and a hash value of the user ID from the external device.
- the host device has an encrypted fixed ID 1101 , and a key 1102 for decrypting encrypted change field information 1104 and the encrypted fixed ID and for encrypting a device unique ID 1112 .
- the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted fixed ID 1101 with the key 1102 so as to obtain a fixed ID 1103 .
- the fixed ID 1103 obtained thus is stored in the secret information processing portion 105 .
- the host device When the host device then reads the encrypted change field information 1104 stored in the FLASH 110 in FIG. 1 , the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted change field information 1104 with the key 1102 so as to obtain change field information 1105 .
- the change field information 1105 obtained thus is stored in the secret information processing portion 105 .
- the host device acquires a user ID 1106 and a hash value 1107 of the user ID from the external device 103 .
- the host device calculates a hash value 1109 .
- the host device compares the hash value 1107 with the hash value 1109 .
- the sequence is terminated abnormally.
- the host device uses the secret information processing portion 105 in FIG. 1 to generate a device unique ID 1112 and a device unique ID generating flag 1114 from the fixed ID 1103 , the change field information 1105 and the user ID 1106 .
- the device unique ID 1112 and the device unique ID generating flag 1114 generated thus are stored in the secret information processing portion 105 .
- the host device uses the secret information processing portion 105 in FIG. 1 to encrypt the generated device unique ID 1112 with the key 1102 so as to obtain an encrypted device unique ID 1113 .
- the encrypted device unique ID 1113 obtained thus is stored in the FLASH 110 .
- the key 1102 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 1102 used to encrypt the device unique ID. Further, any one of the methods described with reference to FIGS. 6 to 12 may be used as the method for setting the change field information.
- the key 1102 , the fixed ID 1103 , the change field information 1105 , the user ID 1106 , the device unique ID 1112 and the device unique ID generating flag 1114 are stored in the secret information processing portion 105 .
- the encrypted fixed ID 1101 , the encrypted change field information 1104 and the encrypted device unique ID 1113 are stored in the FLASH 110 .
- the user ID 1106 acquired from the external device and the hash value 1107 of the user ID 1106 acquired from the external device are stored in the RAM 108 .
- the user ID and the hash value of the user ID are acquired from the external device. It is therefore possible to detect falsification of the user ID.
- FIG. 14 shows a data flow (Example 8) of the encrypted device unique ID generating process 207 in the flow chart of FIG. 3 .
- FIG. 14 represents a method for acquiring an encrypted user ID from the external device.
- FIG. 15 is a block diagram showing the configuration of this system. The configuration of FIG. 15 is the same as that of Example 2 in FIG. 8 , except that an encrypted user ID is generated from a key KB and a user ID by an ID converter 151 in the key management mechanism 121 , and introduced into the external I/F portion of the host device 102 , and that a calculated hash value of the change field information is not compared with an embedded one of the change field information in order to prevent falsification but change field information is embedded as plain text in the host device.
- the other configuration is formed in the same manner as in Example 2 in FIG. 8 . Therefore, detailed description thereof will be omitted here.
- the host device has an encrypted fixed ID 1201 , change field information 1205 , and a key 1202 for decrypting an encrypted user ID and for encrypting a device unique ID.
- the host device When the host device reads the encrypted fixed ID 1201 stored in the FLASH 110 in FIG. 1 , the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted fixed ID 1201 with the key 1202 so as to obtain a fixed ID 1203 .
- the fixed ID 1203 obtained thus is stored in the secret information processing portion 105 .
- the host device reads the change field information 1205 stored in the FLASH 110 in FIG. 1 .
- the host device acquires an encrypted user ID 1206 from the external device 103 and stores the encrypted user ID 1206 in the RAM 108 .
- the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted user ID 1206 with the key 1202 so as to obtain a user ID 1207 .
- the user ID 1207 obtained thus is stored in the secret information processing portion 1205 .
- the host device uses the secret information processing portion 105 in FIG. 1 to generate a device unique ID 1209 and a device unique ID generating flag 1211 from the fixed ID 1203 , the change field information 1205 and the user ID 1207 .
- the device unique ID 1209 and the device unique ID generating flag 1211 generated thus are stored in the secret information processing portion 105 .
- the host device uses the secret information processing portion 105 in FIG. 1 to encrypt the generated device unique ID 1209 with the key 1202 so as to obtain an encrypted device unique ID 1210 .
- the encrypted device unique ID 1210 obtained thus is stored in the FLASH 110 .
- the key 1202 used to decrypt the encrypted fixed ID does not have to be the same as the key 1202 used to encrypt the device unique ID. Further, any one of the methods described with reference to FIGS. 6 to 12 may be used the method for setting the change field information.
- the key 1202 , the fixed ID 1203 , the change field information 1205 , the user ID 1207 , the device unique ID 1209 and the device unique ID generating flag 1211 are stored in the secret information processing portion 105 .
- the encrypted fixed ID 1201 , the encrypted change field information 1205 and the encrypted device unique ID 1210 are stored in the FLASH 110 .
- the encrypted user ID 1206 acquired from the external device is stored in the RAM 108 .
- the encrypted user ID is acquired from the external device. It is therefore possible to hide the user ID.
- FIG. 16 shows a data flow (Example 9) of the encrypted device unique ID generating process 207 in the flow chart of FIG. 3 .
- FIG. 16 represents a method for controlling the number-of-times-of-change.
- the host device has an encrypted fixed ID 1301 , encrypted change field information 1304 , a key 1302 for decrypting the encrypted fixed ID and the encrypted change field information and for encrypting a device unique ID, and number-of-times-of-change control information 1309 .
- the host device When the host device reads the encrypted fixed ID 1301 stored in the FLASH 110 in FIG. 1 , the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted fixed ID 1301 with the key 1302 so as to obtain a fixed ID 1303 .
- the fixed ID 1303 obtained thus is stored in the secret information processing portion 105 .
- the host device When the host device then reads the encrypted change field information 1304 stored in the FLASH 110 in FIG. 1 , the host device uses the secret information processing portion 105 in FIG. 1 to decrypt the encrypted change field information 1304 with the key 1302 so as to obtain change field information 1305 .
- the change field information 1305 obtained thus is stored in the secret information processing portion 105 .
- the host device acquires an encrypted user ID 1306 from the external device 103 and stores the encrypted user ID 1306 in the RAM 108 .
- the host device updates number-of-times-of change information 1308 .
- the host device compares the number-of-times-of-change information 1308 with number-of-times-of-change control information 1309 set in the host device in advance.
- the secret information processing portion 105 in FIG. 1 generates a device unique ID 1312 and a device unique ID generating flag 1314 from the fixed ID 1303 , the change field information 1305 and the user ID 1306 in an integration processing step 1311 .
- the device unique ID 1312 and the device unique ID generating flag 1314 generated thus are stored in the secret information processing portion 105 .
- the host device uses the secret information processing portion 105 in FIG. 1 to encrypt the generated device unique ID 1312 with the key 1302 so as to obtain an encrypted device unique ID 1313 .
- the encrypted device unique ID 1313 obtained thus is stored in the RAM 108 .
- the sequence is terminated abnormally.
- the key 1302 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 1302 used to encrypt the device unique ID. Further, any one of the methods described with reference to FIGS. 6 to 14 may be used as the method for setting the change field information and the user ID.
- the key 1302 , the fixed ID 1303 , the change field information 1305 , the user ID 1306 , the device unique ID 1312 , the device unique ID generating flag 1314 , the number-of-times-of-change control information 1309 and the number-of-times-of-change information 1308 are stored in the secret information processing portion 105 .
- the encrypted fixed ID 1301 , the encrypted change field information 1304 and the encrypted device unique ID 1313 are stored in the FLASH 110 .
- the user ID 1306 acquired from the external device is stored in the RAM 108 .
- FIG. 17 shows, as Example 10, a data flow ( 1 ) of the device unique secret key generating process 206 in the flow chart of FIG. 3 .
- the host device has a key 1402 for decrypting a device unique ID.
- An encrypted device unique ID 1401 obtained by any one of the methods described with reference to FIGS. 6 to 16 is read from the FLASH 110 in FIG. 1 , and decrypted with the key 1402 by the secret information processing portion 105 . Thus, a device unique ID 1403 is obtained. The device unique ID 1403 obtained thus is stored in the secret information processing portion 105 .
- an illegality detecting step 1405 it is determined whether there is or not an illegal attempt to generate a device unique secret key from a device unique ID generating flag 1404 and the device unique ID 1403 obtained by any one of the methods described with reference to FIGS. 6 to 16 .
- an authentication process is performed between the host device of FIG. 4 and the target device.
- an authentication key 402 is generated and bound with the device unique ID 1403 in a device unique secret key generating step 1406 .
- a device unique secret key 1407 is obtained.
- the device unique secret key 1407 obtained thus is stored in the secret information processing portion 105 .
- the host device decrypts contents with the obtained device unique secret key 1407 .
- encrypted contents data received from the external device 103 are decrypted with the device unique secret key 1407 stored in the FLASH 110 , and stored in a predetermined contents data storage unit.
- a user can use the contents data.
- the key 1402 , the device unique ID 1403 , the device unique ID generating flag 1404 , the authentication key 1402 and the device unique secret key 1407 are stored in the secret information processing portion 105 .
- the encrypted device unique ID 1401 is stored in the FLASH 110 .
- the device unique secret key generating step in this Example it is possible to detect an illegal ID.
- the device unique secret key is not generated when the phone number is not registered.
- Example 11 of the invention will be described below.
- an encrypted user ID is generated from a key KB and a user ID by the ID converter 151 in the key management mechanism 121 and introduced into the external I/F of the host device 102 .
- a raw user ID is input into the host device through the external I/F ( 112 ).
- the secret information processing portion of the host device uses an encryption circuit 116 to encrypt a device unique ID generated by an integration circuit 115 with a key K 3 , so as to generate an encrypted device unique ID.
- the secret information processing portion of the host device stores this encrypted device unique ID in the storage portion of the host device through an output control circuit 134 .
- the encrypted device unique ID is input from the storage portion of the host device to the secret information processing portion of the host device through the I/F again.
- the secret information processing portion of the host device uses a decryption circuit 118 to decrypt the encrypted device unique ID with a key K 4 so as to generate the device unique ID to thereby generate a device unique key KI by use of an authentication key KS.
- a user ID input from the outside of the host device through the external IF 112 is compared with a user ID portion of the decrypted device unique ID by a comparison circuit 133 .
- the output control circuit 134 regards the user ID as unauthorized, and suspends a subsequent encryption/decryption process.
- the encrypted device unique ID is decrypted by the decryption circuit 118 and separated by a separation circuit 191 .
- a user ID obtained thus is compared with an initial value of the user ID by a comparison circuit 192 .
- the user ID is regarded as not updated, and the sequence is terminated abnormally.
- the user ID is compared with a user ID input from the external device by a comparison circuit 193 .
- an encryption/decryption process is controlled by a control circuit 119 so as to terminate the sequence abnormally.
- the configuration on the upstream side of the comparison circuits in FIG. 19 is the same as that in FIG. 2 . Constituents the same as those in FIG. 2 are referenced correspondingly and description thereof will be omitted.
- the fixed ID and the user ID are integrated by the integration circuit 115 .
- the encrypted device unique ID is decrypted with the key K 2 by the decryption circuit 113 and separated into the fixed ID portion and the user ID portion by a separation circuit 114 .
- the user ID input to the host device in the aforementioned manner and the initial value of the user ID registered in the host device in advance are compared with each other by the comparison circuit 133 .
- the integrated device unique ID is encrypted again with the key K 3 by the encryption circuit 116 .
- the output control circuit 134 When the output of the comparison circuit 133 indicates that the input user ID does not coincide with the initial value of the registered user ID, the output control circuit 134 performs control not to output an encrypted device unique ID (SID).
- SID device unique ID
- the output control circuit generates an encrypted device unique ID (SID).
- the initial value of the decrypted user ID and a value attached to the secret information processing portion in advance are compared with each other by the comparison circuit 192 .
- the encryption/decryption processing control circuit 119 does not output a device unique secret key. Only when the comparison result indicates that the two values do not coincide with each other, the encryption/decryption processing control circuit 119 outputs a device unique secret key. That is, there is fear that an unregistered user ID would be decrypted if the user ID were used as it is. Therefore, it is checked here whether the user ID has been registered or not. Since determination is made based on the comparison with the information of the initial value in the aforementioned manner, security can be further enhanced.
- the encrypted device unique ID output when the comparison circuit 133 concludes that the user ID coincides with the initial value of the user ID is then input into the secret information processing portion again and decrypted with the key K 4 by the decryption circuit 118 .
- An authentication secret key generated based on mutual authentication between the host device and the target device and a device unique ID are input to a device unique key generation processing circuit 117 .
- a device unique key (device unique secret key) KI is generated.
- a user ID is separated from the device unique ID generated in the secret information processing portion by the separation circuit 191 , and compared with the value attached to the secret information processing portion in advance by the comparison circuit 192 .
- reset etc. is executed so that a subsequent encryption/decryption process is prevented from being performed.
- the comparison result indicates that the separated user ID does not coincide with the attached value, the user ID is regarded as normal, and the subsequent encryption/decryption process is allowed to be performed.
- a user ID input from the outside is compared with the user ID separated by the separation circuit 191 by a comparison circuit 193 .
- reset etc. is executed so that a subsequent encryption/decryption process is prevented from being performed.
- the comparison result indicates that the two user IDs coincide with each other, the user ID is regarded as normal, and the subsequent encryption/decryption process is allowed to be performed.
- FIG. 20 shows Example 12 of the invention in which a user ID acquired from the external device by the host device is encrypted by an encryption circuit 161 using a desired key, and stored in the outside of the secret information LSI 111 , by way of example.
- FIG. 20 is characterized in that the encrypted user ID input into the secret information LSI is integrated with a fixed ID and change field information by an integration circuit 115 . That is, FIG. 20 is characterized in that the secret information processing portion designed to encrypt the aforementioned device unique ID so as to generate an encrypted device unique ID does not decrypt an encrypted user ID input from the outside of the host device through the IF but integrates the encrypted user ID with a fixed ID in the integration circuit 115 by use of change field information so as to generate a device unique ID.
- the user ID is encrypted with a desired key and stored in a hidden state into the outside of the secret information LSI 111 . Since the encrypted user ID is read and integrated with the fixed ID and the change field information, the hidden state of the user ID can be kept easily.
- the device unique key cannot be generated by use of a raw user ID because the user ID is encrypted by the encryption circuit 161 .
- FIG. 21 shows Example 13 of the invention.
- Example 13 is different from Example 11 in that an encrypted user ID is input. In this manner, input of an unauthorized encrypted device unique ID does not lead to operation. Thus, illegal access can be prevented.
- Example 13 is different from Example 11 in that an encrypted user ID is input from the external device to a decryption circuit 194 of the secret information LSI of the host device 102 .
- the user ID encrypted by the ID converter 151 of the key management mechanism is decrypted with a key K 5 by a decryption circuit 194 in the secret information LSI of the host device, and integrated with a fixed ID and change field information by an integration circuit 115 in the same manner as in Example 11.
- the user ID is encrypted so that the user ID can be hidden more surely accordingly.
- FIG. 18 shows a block configuration for contents distribution in which a host device 102 , a target device 101 , an external device 103 and a contents provider 113 are provided according to Embodiment 2 of the invention.
- the contents provider 113 can communicate with an external I/F portion 112 of the host device 102 .
- a host CPU 106 gives an instruction to a secret information LSI 111 so that the secret information LSI 111 performs data exchange with the contents provider 113 through the external I/F portion 112 in the same manner as data exchange with the target device 101 . In this manner, the contents provider 113 can be protected.
- FIG. 18 shows the whole outline of data exchange including a key management mechanism.
- FIG. 18 is correspondent to the encrypted device unique ID generating process ( 1 ) in FIG. 6 .
- FIGS. 22A to 22 D show configurations of a device unique ID according to Embodiment 3 of the invention.
- the user ID portion which has not been updated includes all Os.
- the device unique ID encrypted at the time of generation of the device unique key is decrypted, and the user ID portion is separated from the decrypted device unique ID by the separation circuit. Determination as to whether the user ID portion has been updated correctly or not is based on the determination as to whether the user ID portion includes all Os or not.
- this embodiment is characterized in that a determination flag as to whether updating has been performed correctly or not is included in a device unique ID.
- the 22A to 22 D are explanatory views showing configurations of the device unique ID and change field information.
- the device unique ID is generated by the key management mechanism. As shown in FIG. 22A , the device unique ID includes two IDs (i.e. a fixed ID 301 and a user ID 302 ) and a flag FLAG 0 added ahead of the fixed ID 301 .
- the other configuration is the same as that in the aforementioned Embodiment 1. That is, the fixed ID 301 is secret information determined before the host device is registered or replaced.
- the user ID is user-dependent information such as a phone number.
- the user ID is an ID which can be changed when the host device is registered or replaced.
- the device unique ID is roughly constituted by three parts, i.e. a determination flag region, a fixed ID 301 and a user ID 304 .
- a determination flag region When the determination flag region is provided in the device unique ID, it is possible to determine whether the user ID has been updated correctly or not.
- the determination flag region may contain one bit or a plurality of bits.
- the determination flag region is used only as a determination flag.
- the device unique key generating method based on a device unique ID constituted by the fixed ID and the user ID excluding the determination flag region may be used in a device unique key generating process.
- the device unique ID is constituted by the two IDs (i.e. the fixed ID 301 and the user ID 302 ) and the flag FLAG 0 added ahead of the fixed ID 301 .
- the other configuration is the same as that in the aforementioned Embodiment 1. That is, the fixed ID 301 is secret information determined before the host device is registered or replaced.
- the user ID is user-dependent information such as a phone number.
- the user ID is an ID which can be changed when the host device is registered or replaced.
- the device unique ID is formed by the key management mechanism so that a flag region is provided ahead of a fixed ID.
- the device unique ID where a user ID has not yet been registered has a configuration in which the fixed ID 301 and a user ID 303 are encrypted as shown in FIG. 22B .
- a user ID field which should be set when a user ID is registered is defined as a desired value.
- the device unique ID where a user ID has been registered has a configuration in which the fixed ID 301 and a user ID 304 are encrypted as shown in FIG. 22C . When the user ID is registered thus, FLAG 1 is generated.
- Change field information defines a field of the device unique ID in which the user ID should be put in the same manner as in the aforementioned embodiment. For example, as shown in FIG. 22D , FLAG is first formed and fields of the device unique ID are then configured to indicate a start point and an end point of the user ID. For example, assume that an a-th bit and a b-th bit from the head of the device unique ID are the start point and the end point of the user ID respectively. In this case, the change field information is (a, b). In the change field information, the same data as the fixed ID may be placed repeatedly before and after the user ID or the user ID may be inserted into the field of the fixed ID.
- the encrypted device unique ID is decrypted when a device unique key is generated.
- the flag is checked to determine whether the device unique ID has been updated correctly or not.
- the device unique key is generated.
- processing is suspended to prevent the device unique key from being generated.
- FIG. 23 shows Example 14 of the invention.
- a device unique ID having a determination flag region added thereto is generated and encrypted with a key K 1 so that an encrypted device unique ID (ID E1 ) is generated.
- Key information for opening the encrypted device unique ID (ID E1 ) is given to a key K 2 of a secret information LSI 111 of a host device 102 in advance.
- the device unique ID (ID 0 ) is decrypted with the key K 2 by a decryption circuit 113 , and separated into a determination flag region, a fixed ID portion (ID F ) and a user ID portion (ID c0 ) by a separation circuit 114 .
- a user ID (ID u1 ) is integrated with the determination flag region and the fixed ID portion (ID F ) by an integration circuit 115 based on the change field information.
- a determination flag indicating that the user ID has been updated is asserted.
- the device unique ID obtained thus is encrypted with a key K 3 .
- the encrypted device unique ID (SID) is stored in a storage portion of the host device.
- the encrypted device unique ID (SID) is input to the secret information LSI 111 again and decrypted with a key K 4 by a decryption circuit 118 .
- a flag determination region is separated from the decrypted device unique ID by a separation circuit 195 .
- the determination flag region is checked by a flag determination circuit 194 . When the determination flag has not been asserted correctly, the processing is terminated abnormally. When the determination flag has been asserted, a device unique key generating process 117 is executed to generate a device unique key KI.
- the flag is checked to determine the device unique ID has been updated correctly or not.
- the device unique key is generated.
- processing is suspended to prevent the device unique key from being generated.
- Embodiment 1 The same method as that described in Embodiment 1 may be used as the method for inputting change field information and a user ID in this Example. As for control of the number of times with which the device unique ID has been changed, the method described in Embodiment 1 may be combined likewise.
- a determination flag region is defined in a device unique ID. Accordingly, input of an unauthorized encrypted device unique ID does not lead to operation. Thus, illegal access can be prevented.
- the invention is applicable to a system for registration or model change of portable phones etc. because of very high security and simple management.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
- 1. Field of the Invention
- The present invention relates to a method for generating a device unique key, a secret information LSI with a secret information processing function using the method, a host device mounted with the LSI, a recording medium with an authentication function used in the host device, and a portable terminal with the recording medium having an authentication function. Particularly, it relates to a method for changing a device unique ID including user information (user ID) such as a phone number in a system in which a device unique key is generated in accordance with the device unique ID including the user information when a host device such as a portable terminal is registered or replaced.
- 2. Description of the Related Art
- There is a case where contents of music data, image data or games are downloaded to a host device such as a portable terminal from the Internet or a site managed by a portable phone company or the like, and the contents are stored in a target device so as to be used on the host device such as the portable terminal.
- For example, the target device designates a memory card such as an SD card. There is often a charge for the contents, and the contents often include copyrighted ones. The contents cannot be copied but made usable only on the user's host device such as the portable terminal where the contents have been downloaded. Thus, the copyrights of the contents are protected.
- The host device such as the portable terminal acquires a device unique ID including a user ID such as a phone number from an external device when the host device is registered or replaced. A device unique key is generated from the device unique ID. The contents are encrypted with the device unique key so that the contents can be used only on the user's host device such as the portable terminal where the contents have been downloaded. Thus, the copyrights of the contents are protected. JP-A-2002-342168 discloses a method for transferring data between host devices such as portable terminals while securing copyright protection of data stored in the host devices such as the portable terminals.
- In the aforementioned background-art method for changing a device unique ID, a host device such as a portable terminal acquires a device unique ID including a user ID such as a phone number from an external device when the host device is shipped or replaced. However, the method has a problem that it is difficult to protect the device unique ID or deal with an illegal access.
- The present invention was developed in consideration of the foregoing situation. It is an object of the invention to provide a method for generating a device unique key to thereby establish a system for protecting a device unique ID including a user ID such as a phone number acquired from an external device when a host device such as a portable terminal is shipped or replaced, a secret information LSI with a secret information processing function using the method, a host device mounted with the LSI, a recording medium with an authentication function used in the host device, and a portable terminal with the recording medium having an authentication function.
- A method for generating a device unique key according to the invention includes the steps of: integrating a fixed ID and a user ID to thereby generate a device unique ID, the fixed ID being determined for a host device in advance and stored in a storage portion of the host device, the user ID being able to be determined desirably by a user; and generating a device unique key based on the device unique ID.
- In the method according to the invention, a fixed ID determined for a host device in advance and a user ID which can be determined desirably by a user are integrated to generate a device unique ID. Due to the device unique ID generated newly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- The method for generating a device unique key according to the invention further includes the steps of: making a key generator of a key management mechanism encrypt the fixed ID to thereby generate an encrypted fixed ID; making a secret information processing portion of the host device decrypt the encrypted fixed ID and store the decrypted fixed ID as the fixed ID into the storage portion of the host device; making an I/F of the host device acquire the user ID the user can determine desirably; and making the secret information processing portion of the host device integrate the fixed ID and the user ID to thereby generate a device unique ID.
- In the method according to the invention, a device unique key is generated based on an encrypted device unique ID obtained by encrypting a device unique ID. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- The method for generating a device unique key according to the invention includes a method in which the step of generating the device unique ID includes the steps of: generating change field information defining a field of the device unique ID in which the user ID should be input; and making the host device input the user ID into a desired field of the device unique ID in accordance with the change field information so as to integrate the user ID with the fixed ID to thereby generate the device unique ID. In addition, the method for generating a device unique key according to the invention includes a method including the step of setting the user ID in the desired field based on the change field information and then making the secret information processing portion of the host device integrate the user ID with the fixed ID so as to generate the device unique ID.
- In the method according to the invention, a device unique ID is generated based on change field information defining a field of the device unique ID in which the user ID should be input. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- The method for generating a device unique key according to the invention includes a method further including the steps of: making the secret information processing portion of the host device encrypt the device unique ID to thereby generate an encrypted device unique ID; storing the encrypted device unique ID into the storage portion of the host device; and making the secret information processing portion of the host device generate a device unique key based on the device unique ID.
- In the method according to the invention, an encrypted device unique ID is generated and stored in the storage portion as it is. When the encrypted device unique ID is used, the encrypted device unique ID is decrypted, and a device unique key is generated based on the decrypted device unique ID. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented. That is, when mutual authentication is established between the target device and the host device, an authentication key can be obtained. The device unique ID is bound with the authentication key so that a device unique key is generated. Here, the binding may be performed so that the authentication key is encrypted with the device unique ID, or a logical product is obtained between the device unique ID and the authentication key. In short, it is essential to associate the device unique ID with the authentication key to thereby obtain a device unique key.
- The method for generating a device unique key according to the invention includes a method further including the steps of: making the secret information processing portion of the host device generate an authentication key based on mutual authentication between the host device and a target device; and making the secret information processing portion of the host device generate a device unique key based on the device unique ID and using the authentication key generated in the step of generating the authentication key.
- In the method for generating a device unique key according to the invention, an authentication key is generated based on mutual authentication between the host device and the target device. When the mutual authentication is not established, a subsequent device unique ID generating process cannot be executed. Accordingly, illegal access from an unauthorized host device can be prevented.
- The method for generating a device unique key according to the invention includes a method further including the steps of: making the key generator of the key management mechanism encrypt the change field information to thereby generate encrypted change field information, and store the encrypted change field information into the host device; and making the secret information processing portion of the host device acquire the encrypted change field information and decrypt the change field information.
- In the method according to the invention, change field information is encrypted with a key so as to generate an encrypted change field information, while the encrypted change field information is decrypted with the key so as to acquire the change field information. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- The method for generating a device unique key according to the invention includes a method further including the step of making an external device I/F of the host device acquire the change field information from the external device.
- In the method according to the invention, the host device acquires change field information from the external device. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- The method for generating a device unique key according to the invention includes a method in which the step of acquiring the change field information is a step of acquiring the change field information as encrypted change field information.
- In the method according to the invention, the host device acquires change field information from the external device in the form of encrypted change field information. Accordingly, protection can be further enhanced, and illegal access can be prevented.
- The method for generating a device unique key according to the invention includes a method further including the step of calculating a hash value of the change field information.
- In the method according to the invention, a hash value of the change field information is calculated in the host device, and a hash value of the change field information is calculated in the key management mechanism or the like in advance and input to the host device, the hash values are compared in a comparison circuit. When the hash values do not coincide with each other, an abnormal termination process such as reset or suspension of a processing circuit is performed. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- The method for generating a device unique key according to the invention includes a method in which the change field information is plain text.
- In the method according to the invention, the change field information is stored as plain text. Accordingly, confidentialty is poor but management is easy. When the change field information is plain text, it is desired from the point of view of confidentially that the change field information is stored, for example, in the secret information processing portion of the host device.
- The method for generating a device unique key according to the invention includes a method further including the step of making an external device I/F of the host device acquire the user ID from an external device when the device unique ID is registered, exchanged, updated or changed.
- In the method according to the invention, the user ID is acquired from the external device when the device unique ID is registered, exchanged, updated or changed. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- The method for generating a device unique key according to the invention includes a method in which the step of acquiring the user ID is a step of acquiring the user ID as an encrypted user ID.
- In the method according to the invention, the host device acquires the user ID as an encrypted user ID from the external device. Accordingly, protection can be further enhanced, and illegal access can be prevented.
- The method for generating a device unique key according to the invention includes a method further including the step of calculating a hash value of the user ID.
- In the method according to the invention, a hash value of the user ID is calculated in the host device, and compared with a stored hash value calculated in the host device or the like by a comparison circuit. When the hash values do not coincide with each other, an abnormal termination process such as reset or suspension of a processing circuit is performed. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- The method for generating a device unique key according to the invention includes a method in which the user ID is plain text.
- In the method according to the invention, the user ID is stored as plain text. Accordingly, confidentially is poor but management is easy. When the user ID is plain text, it is desired from the point of view of confidentialty that the user ID is stored, for example, in the secret information processing portion of the host device.
- The method for generating a device unique key according to the invention includes a method further including the step of making a secret information processing portion of the host device judge the number of times with which the device unique ID has been changed, and update the device unique ID as long as the number of times with which the device unique ID has been changed is not larger than a predetermined number.
- In the method according to the invention, the number of times with which the device unique ID has been changed is determined. When the number of times with which the device unique ID has been changed does not exceed a predetermined number, the device unique ID is updated. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- The method for generating a device unique key according to the invention includes a method further including the step of making the host device generate an authentication key from information stored in the host device and information stored in the target device.
- According to the method according to the invention, illegal access can be prevented more surely.
- The method for generating a device unique key according to the invention includes a method in which the host device stores initial-value of the user ID, and it is determined whether the initial-value of the user ID coincides with a user ID portion obtained by a secret information processing portion of the host device decrypting an encrypted fixed ID stored by the host device, or not.
- In the method according to the invention, initial-value of the user ID is stored and compared with a user ID in each case. Accordingly, illegal access can be prevented more surely.
- The method for generating a device unique key according to the invention includes a method further including the step of making a secret information processing portion of the host device encrypt the device unique ID to thereby generate an encrypted device unique ID, and outputting the encrypted device unique ID.
- In the method according to the invention, the encrypted device unique ID is encrypted. Accordingly, even when the encrypted device unique ID is stored outside the secret information processing portion, confidentialty can be secured. Accordingly, falsification of the device unique ID or illegal access can be prevented.
- The method for generating a device unique key according to the invention includes a method in which the host device stores initial-value of the user ID; and it is determined whether a user ID obtained by decrypting and then separating the encrypted device unique ID input again into the secret information processing portion coincides with the initial value of the user ID stored by the host device in advance, or not.
- According to the method according to the invention, authentication can be performed more easily and more surely.
- The method for generating a device unique key according to the invention includes a method further including the steps of: making a secret information processing portion of the host device encrypt the device unique ID to thereby generate an encrypted device unique ID; making the secret information processing portion of the host device decrypt an encrypted device unique ID to thereby generate a device unique ID, the encrypted device unique ID being input from the storage portion of the host device through an I/F of the host device; and comparing a user ID input from the outside of the host device through the I/F with a user ID portion of the decrypted device unique ID, and regarding the input user ID as unauthorized and suspending a subsequent encryption/decryption process when the input user ID does not coincide with the user ID portion of the decrypted device unique ID.
- According to the method according to the invention, illegality can be found in an early stage.
- The method for generating a device unique key according to the invention includes a method further including the steps of: making a key generator of a key management mechanism add a determination flag region and encrypt the fixed ID to thereby generate an encrypted fixed ID; making a secret information processing portion of the host device integrate the fixed ID with the user ID and update the determination flag region to thereby generate a device unique ID; and generating a device unique key based on the device unique ID.
- According to the method according to the invention, when a determination flag region is added simply, whether the user ID has been updated or not can be determined without requiring a determination step in an early stage.
- The method for generating a device unique key according to the invention includes a method further including the steps of: determining whether the determination flag region has been updated or not; and regarding the determination flag region as unauthorized and suspending processing when the determination flag region has not been updated.
- According to the method according to the invention, illegality can be found in an early stage.
- The method for generating a device unique key according to the invention includes a method in which the storage portion is disposed in a secret information processing portion.
- According to the method, confidentialty can be secured more surely.
- The method for generating a device unique key according to the invention includes a method in which the storage portion is disposed in the host device but out of a secret information processing portion of the host device.
- According to the method, confidentialty becomes poor. However, if a non-volatile memory or the like is used as the storage portion, the contract details can be taken over extremely easily when the terminal device is changed and updated.
- The method for generating a device unique key according to the invention includes a method in which the user ID is encrypted, and input as an encrypted user ID to the secret information processing portion of the host device.
- In the method according to the invention, the user ID can be hidden. Accordingly, security can be further enhanced.
- A device unique ID according to the invention includes: a fixed ID determined for a host device in advance; and a user ID a user can determine desirably; wherein the fixed ID and the user ID are integrated with each other whenever the user ID is used so that the device unique ID has a data structure which can be changed whenever the device unique ID is used.
- The device unique ID according to the invention includes a device unique ID having a data structure in which the fixed ID and the user ID are integrated based on change field information defining a field of the device unique ID the user ID should be input into.
- A secret information LSI according to the invention includes a secret information processing portion for generating a device unique ID; wherein the device unique ID has a data structure in which a fixed ID determined for a host device in advance and a user ID a user can determine desirably whenever the user ID is used are integrated with each other so that the data structure can be changed whenever the device unique ID is used.
- The secret information LSI according to the invention includes a secret information LSI in which the secret information processing portion integrates the fixed ID with the user ID based on change field information so as to generate the device unique ID, the change field information defining a field of the device unique ID the user ID should be input into.
- The secret information LSI according to the invention has a secret information processing function in which the fixed ID determined for the host device in advance and the user ID the user can determine desirably are integrated, and a device unique ID is generated based on the change field information. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- A host device according to the invention includes the secret information LSI.
- The host device according to the invention includes a host device further including: a decryption circuit for decrypting an encrypted fixed ID; a storage portion for storing the decrypted fixed ID; an I/F for inputting the user ID the user can determine desirably; and a secret information processing portion by which the fixed ID is read from the storage portion, and the fixed ID and the user ID input through the I/F are integrated to generate a device unique ID.
- The host device according to the invention includes a host device further including an encryption circuit for encrypting the device unique ID to thereby generate an encrypted device unique ID.
- The host device according to the invention includes a host device further including an authentication key generating circuit for generating an authentication key based on mutual authentication between the host device and the target device.
- The LSI according to the invention includes an LSI further including a storage area for storing encrypted change field information.
- The host device according to the invention includes a host device further including an external device I/F through which the user ID can be acquired from an external device when the device unique ID is registered, replaced, updated or changed.
- The host device according to the invention includes a host device further including an external device I/F through which the change field information can be input from the external device.
- The host device according to the invention includes a host device further including a determination circuit for determining the number of times with which the device unique ID has been changed.
- A recording medium according to the invention is a recording medium with an authentication function used in the host device.
- A portable terminal having a recording medium according to the invention includes a secret information processing function and an authentication function.
- In a method for distributing contents using the method according to the invention, a fixed ID determined for the host device in advance and a user ID the user can determine desirably are integrated, and a device unique ID is generated based on change field information. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- A database according to the invention accumulates contents distributed by the contents distributing method. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
- The user in this document means not a final customer but a maker manufacturing host devices or a shop selling or registering the host devices.
- The encryption/decryption in the invention includes both encryption/decryption using a secret key system and a public key system. When the invention is applied to a public key system, it will go well if a secret key is used as a key.
- As described above, according to the invention, a fixed ID determined before a host device such as a portable terminal is shipped or replaced is, for example, encrypted in advance and stored in the host device such as the portable terminal. After a user ID such as a phone number is registered from an external device when the host device is shipped or replaced, the fixed ID and the user ID are integrated so that a new device unique ID is generated. Thus, a new device unique ID can be generated whenever a user ID is registered. A device unique key is generated based on the device unique ID. Accordingly, protectability of the device unique ID can be enhanced, and illegal access can be prevented.
-
FIG. 1 is a block diagram showing the overall configuration of a device unique ID changing system. -
FIG. 2 is a block diagram showing the overall configuration of the system, focusing on a data flow therein according to Example 1. -
FIG. 3 is a flow chart. -
FIGS. 4A to 4D are diagrams showing configurations of a device unique ID. -
FIG. 5 is a data flow among a host device, a target device and an external device in the flow chart ofFIG. 3 . -
FIG. 6 is a chart showing a data flow of an encrypted device uniqueID generating process 207 in the flow chart ofFIG. 3 (where change field information is stored in the host device). -
FIG. 7 is a chart showing a data flow of the encrypted device unique ID generating process 207 (Example 2) in the flow chart ofFIG. 3 (where change field information and a hash value are stored in the host device). -
FIG. 8 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 2 of the invention. -
FIG. 9 is a data flow of the encrypted device unique ID generating process 207 (Example 3) in the flow chart ofFIG. 3 (where change field information is stored and encrypted in the host device). -
FIG. 10 is a chart showing a data flow of the encrypted device unique ID generating process 207 (Example 4) in the flow chart ofFIG. 3 (where change field information is acquired from the external device). -
FIG. 11 is a data flow of the encrypted device unique ID generating process 207 (Example 5) in the flow chart ofFIG. 3 (where change field information is acquired from the external device, a hash value of the change field information is also acquired from the outside, and falsification of the change field information is detected). -
FIG. 12 is a data flow of the encrypted device unique ID generating process 207 (Example 6) in the flow chart ofFIG. 3 (where encrypted change field information is acquired from the external device). -
FIG. 13 is a data flow of the encrypted device unique ID generating process 207 (Example 7) in the flow chart ofFIG. 3 (where a hash value of a user ID is acquired from the outside and falsification of the user ID is detected). -
FIG. 14 is a data flow of the encrypted device unique ID generating process 207 (Example 8) in the flow chart ofFIG. 3 (where an encrypted user ID is acquired from the external device). -
FIG. 15 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 8 of the invention. -
FIG. 16 is a data flow of the encrypted device unique ID generating process 207 (Example 9) in the flow chart ofFIG. 3 (where the number of times of update is controlled). -
FIG. 17 is a data flow of a device unique key generating process 206 (Example 10) in the flow chart ofFIG. 3 . -
FIG. 18 is a block diagram showing a block configuration for contents distribution. -
FIG. 19 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 11 of the invention. -
FIG. 20 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 12 of the invention. -
FIG. 21 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 13 of the invention. -
FIGS. 22A to 22D are diagrams showing configurations of a device unique ID according to Embodiment 3 of the invention. -
FIG. 23 is a block diagram showing the overall configuration of a system, focusing on a data flow therein according to Example 14 of the invention. -
Embodiment 1 which is the best mode for carrying out the invention will be described below. InEmbodiment 1, a device unique key generating system as an embodiment of the invention will be described.FIG. 1 shows the overall configuration of a device unique ID changing system constituted by a host device, a target device and an external device.FIG. 2 shows the overall configuration of an example of this system (corresponding to undermentioned Example 1), focusing on a data flow therein. - The
target device 101 is a memory card represented by an SD card. When a host device intends to change a device unique ID, thetarget device 101 performs an authentication process between the target device and the host device. When thetarget device 101 fails in authentication, thetarget device 101 is not allowed to generate a key (secret key) serving as an authentication key for decrypting secret information encrypted in advance. With such a configuration, the encrypted secret information can be prevented from being decrypted in an unauthorized host device. - As shown in
FIG. 1 , thehost device 102 is a host device of a portable terminal represented by a portable phone. Thehost device 102 includes aninternal bus 109, a secretinformation processing portion 105 for encrypting/decrypting secret information in accordance with a predetermined sequence, ahost CPU 106 for activating the predetermined sequence for the secretinformation processing portion 105, a target I/F portion 104 for inputting/outputting data between thehost CPU 106 and thetarget device 101, a host I/F portion 107 for inputting/outputting data between thehost CPU 106 and the secretinformation processing portion 105, anRAM 108 serving as a work area for thehost CPU 106 and the secretinformation processing portion 105 to temporarily store data required for their operation, a nonvolatile memory (FLASH) 110 for storing secret information encrypted in advance, and an external I/F portion 112 to be connected to theexternal device 103. The secretinformation processing portion 105, the host I/F portion 107 and the target I/F portion 104 constitute asecret information LSI 111. - The
external device 103 is an information management system such as a server. Theexternal device 103 connected to thehost device 102 inputs a user ID to thehost device 102. When secret information is to be read or written between thetarget device 101 and thehost device 102, thehost device 102 has to perform authentication between thetarget device 101 and thehost device 102. Here, inFIG. 2 showing the overall configuration of the system, akey management mechanism 121 is also provided in theexternal device 103. In thekey management mechanism 121, akey generator 120 encrypts a device unique ID (ID0) with a key K1 to thereby generate an encrypted device unique ID (ID1). The device unique ID (ID0) is constituted by a fixed ID portion (IDF) and a variable ID information portion (IDc0). - The
key management mechanism 121 is designed to give key information to a key K2 of thesecret information LSI 111 of thehost device 102 in advance. The key information serves to decrypt this encrypted device unique ID (ID1). When authentication of the key K2 is approved in thesecret information LSI 111 of thehost device 102, adecryption circuit 113 decrypts the encrypted device unique ID (ID1) with the key K2 so as to acquire the device unique ID (ID0) constituted by the fixed ID portion (IDF) and the variable ID information portion (IDc0). Aseparation circuit 114 separates this device unique ID into the fixed ID portion (IDF) and the variable ID information portion (IDc0). On this occasion theseparation circuit 114 extracts only the fixed ID portion (IDF) while leaving behind the variable ID information portion (IDc0) entirely filled with “0”. Further, the encrypted device unique ID (SID) output from the secret information LSI is input into the secret information LSI again and decrypted by adecryption circuit 118. - When the authentication succeeds thus, the
host device 102 reads secret information from thetarget device 101 through the target I/F portion 104. Thehost device 102 uses the secret information decrypted by the secretinformation processing portion 105. Although the secretinformation processing portion 105 is activated to operate by thehost CPU 106, the secretinformation processing portion 105 is hidden hardware. When the secretinformation processing portion 105 is activated, the secretinformation processing portion 105 performs only a predetermined sequence in which security is secured or less security is required. - Here, an
integration circuit 115 integrates change field information IF, a user ID (IDu1) and the fixed ID portion (IDF) to thereby form a device unique ID (ID1). The change field information IF is built in thehost device 102 in advance. The user ID (IDu1) is input from theexternal device 103 through the external I/F portion 112. The fixed ID portion (IDF) is extracted by theseparation circuit 114. The device unique ID (ID1) obtained thus is encrypted with a key K3 so that an encrypted device unique ID (SID1) is obtained. - Further, the encrypted device unique ID (SID1) obtained thus is decrypted with a key K4 again by the
decryption circuit 118 so that a device unique key (device unique secret key) KI is generated by a device unique keygeneration processing circuit 117 again. Thereference numeral 119 designates an encryption/decryption processing control circuit. - Examples of the
host device 102 include communicatable portable music player/portable audio player serving as a portable terminal, a network connected portable game machine and a portable phone. Examples of thetarget device 101 include a memory card (SD card) with an authenticatable copyright protection function, a DVD (DVDRAM) with a copyright protection function and a hard disk with a copyright protection function. Examples of theexternal device 103 include an information management system such as a server and a phone number registration machine. -
FIG. 3 is a flow chart of a process for acquiring a user ID from the external device, updating a device unique ID, and generating a device unique secret key in the device unique ID changing system shown inFIGS. 1 and 2 . - First, in a mutual
authentication processing step 201 between the host device and the target device, it is determined whether the host device is an unauthorized device or not. When the mutual authentication succeeds here, an encrypted fixed ID is decrypted with a key (K2 inFIG. 2 ) in an encrypted fixed IDdecryption processing step 202. When the mutual authentication is unsuccessful, the sequence is terminated abnormally. - Then, a change field
information processing step 203 is executed. This change fieldinformation processing step 203 is a process for handing over designated change field information to a device uniqueID generating step 205. In a user ID externally acquiringstep 204, a user ID is acquired from the external device and stored in thehost device 102. - Further, in the device unique
ID generating step 205, the pieces of information obtained in the encrypted fixed IDdecryption processing step 202, the change fieldinformation processing step 203 and the user ID externally acquiringstep 204 are integrated so that a device unique ID is generated. - When the device unique ID is generated thus, a device unique secret key is generated in a device unique secret
key generating step 206 using the device unique ID generated in the device uniqueID generating step 205. This secret key will be used as a key for hiding information. - When the device unique ID is set illegally, the sequence is terminated abnormally.
- Here, the keys K1 to K4 shown in
FIG. 2 may be all the same. Alternatively, different keys may be used for a set of the k eys K1 and K2 and a set of the keys K3 and K4 respectively. An authentication key Ks and a device unique key KI are updated and changed whenever processing is performed. -
FIGS. 4A to 4D are explanatory diagrams showing configurations of the device unique ID and the change field information. As shown inFIG. 4A , the device unique ID is roughly constituted by two IDs, that is, afixed ID 301 and a user ID 302. The fixedID 301 is secret information determined before the host device is registered or replaced. The user ID is user-dependent information such as a phone number. The user ID is an ID which can be changed when the host device is registered or replaced. - As shown in
FIG. 4B , a device unique ID before registration of a user ID has a configuration in which a fixedID 301 and auser ID 303 are encrypted. The field of theuser ID 303 set at the time of registration is defined as “0”. As shown inFIG. 4C , the device unique ID after registration of the user ID has a configuration in which the fixedID 301 and auser ID 304 are encrypted. - Change field information defines a field of the device unique ID in which the user ID should be put. For example, as shown in
FIG. 4D , fields of the device unique ID are formed to indicate a start point and an end point of the user ID. For example, assume that an a-th bit and a b-th bit from the head of the device unique ID are the start point and the end point of the user ID respectively. In this case, the change field information is (a, b). In the change field information, the same data as the fixed ID may be placed repeatedly before and after the user ID or the user ID may be inserted into the field of the fixed ID. When the fields are changed thus based on the change field information, a large number of device unique IDs can be generated in accordance with the layout of the fixed ID and the user ID. Thus, a device unique ID which is extremely complicated and is hardly decrypted can be obtained so that the protectability of the device unique ID can be enhanced greatly. -
FIG. 5 shows a data flow among the host device, the target device and the external device in the flow chart ofFIG. 3 . Anauthentication processing step 401 is performed between the host device and the target device. When the mutual authentication succeeds, anauthentication key 402 which will be required in a device unique secretkey generating step 408 is generated in the secretinformation processing portion 105 inFIG. 1 . On the other hand, when the mutual authentication is unsuccessful so that the host device is regarded as unauthorized, the sequence is terminated abnormally. - The host device generates a device unique ID from an encrypted fixed
ID 403 acquired internally from the host device and auser ID 405 acquired from the external device, and encrypts the device unique ID with a key so as to generate an encrypted device unique ID (encrypted device unique ID generating step 406). This encrypted device unique ID is stored in a storage portion of the host device. The encrypted device unique ID is decrypted with a key 404 by the secret information processing portion of the host device so that a device unique secret key is generated by use of the authentication key 402 (Step 408). Then, this device unique key (device unique secret key) 409 is stored in the host device. - (Encrypted Device Unique ID Generating Process 1)
- Processes will be described below in detail as examples of the invention.
-
FIG. 6 shows data flow (1) of Example 1 of an encrypted device uniqueID generating process 207 in the flow chart ofFIG. 3 .FIG. 6 represents a method for acquiring only a user ID from the external device while providing change field information in the host device in advance. The overall configuration of this system is illustrated in detail inFIG. 2 . - The
host device 102 has an encrypted fixed ID and a key (502) for decrypting the encrypted fixed ID. When the host device retrieve the encrypted fixed ID stored in theFLASH 110 inFIG. 1 , the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encrypted fixed ID with the key so as to obtain a fixed ID. The fixed ID obtained thus is integrated with change field information acquired from the host device and a user ID acquired from the external device so that a device unique ID is generated. This device unique ID is stored in the secretinformation processing portion 105 of the host device. - Since the change field information is plain text, the change field information is stored in the secret
information processing portion 105 in thesecret information LSI 111 inFIG. 1 . - Further, the generated device unique ID and a device unique ID generating flag are stored in the secret
information processing portion 105. Here, the generated device unique ID is encrypted with a key by the secretinformation processing portion 105 inFIG. 1 so that an encrypted device unique ID is obtained. The encrypted device unique ID obtained thus is stored in theFLASH 110. - Here, the key 502 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 502 used to encrypt the device unique ID. In addition, the fixed ID or the change field information does not have to be encrypted as long as access thereto from any unauthorized external device or the like can be blocked.
- In
FIG. 6 , the key 502, the fixedID 503, thechange field information 504, the deviceunique ID 507 and the device uniqueID generating flag 509 are stored in the secretinformation processing portion 105. The encrypted fixedID 501, thechange field information 504 and the encrypted deviceunique ID 508 are stored in theFLASH 110. Theuser ID 505 acquired from the external device is stored in theRAM 108. - In
FIG. 6 , the encrypted fixedID 501 and the key 502 are acquired, and the encrypted fixed ID is decrypted with this key so that the fixedID 503 is obtained. On the other hand, thechange field information 504 is taken out, and the decrypted fixed ID obtained inStep 503, thechange field information 504 and theuser ID 505 acquired from the external device are integrated (Step 506). Thus, the deviceunique ID 507 is generated and the device uniqueID generating flag 509 is generated. - The device
unique ID 507 is encrypted with the key 502 by the host device so that the encrypted device unique ID is obtained (Step 508). This encrypted device unique ID is stored in the host device. The encrypted fixed ID, the change field information and the encrypted device unique ID are stored in theFLASH 110. Theuser ID 505 acquired from the external device is stored in theRAM 108. - According to the encrypted device unique ID generating process in this Example, only the user ID is input from the external device while the change field information is provided in the host device in advance. Thus, procedure and management are simplified. In addition, since the change field information is plain text, there is an advantage that it is not necessary to decrypt the change field information. When priority is given to the confidentially of the change field information, the change field information may be stored in the secret information LSI.
- (Encrypted Device Unique ID Generating Process 2)
-
FIG. 7 shows a data flow (Example 2) of the encrypted device uniqueID generating process 207 in the flow chart ofFIG. 3 .FIG. 7 represents a method for acquiring only a user ID from the external device while providing change field information and a hash value in the host device in advance. The overall configuration of this system is illustrated in detail inFIG. 8 .FIG. 8 is the same as the block diagram of the overall configuration (FIG. 2 ) of the system used in Example 1, except that ahash calculator 122 is provided in thekey management mechanism 121. Here, the change field information is stored as raw data in the storage portion (FLASH 110) of the host device. On the other hand, a hash value HF (605) generated by thehash calculator 122 of thekey management mechanism 121 is embedded in the host device. The hash value HF (605) is compared with a hash value H0 (607) calculated from the change field information stored in the FLASH 110 (comparison step 608). Thus, falsification in the change field information can be found and prevented. - As shown in
FIG. 8 , the host device decrypts an encrypted fixedID 601 with a key K2 (602). On the other hand, a hash value HF (605) ofchange field information 604 is calculated by thehash calculator 122 provided in thekey management mechanism 121, and stored in the storage portion of the host device. In the secret information processing portion of the host device, a hash value H0 (607) calculated from plain text of the change field information stored in theFLASH 110 is compared with the hash value calculated in thekey management mechanism 121. Thus, it is checked whether the change field information has been falsified or not. The host device reads an encrypted fixed ID stored in theFLASH 110 inFIG. 1 , and uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encrypted fixed ID with a key so as to obtain a fixed ID. The fixed ID obtained thus is stored in the secret information processing portion. - That is, as shown in
FIG. 7 , the host device has the key 602 used to decrypt the encrypted fixedID 601 stored in the host device and to encrypt a deviceunique ID 611, the rawchange field information 604, and thehash value 605 calculated in thekey management mechanism 121 in advance. When the host device reads the encrypted fixedID 601 stored in theFLASH 110 inFIG. 1 , the secretinformation processing portion 105 inFIG. 1 decrypts the encrypted fixedID 601 with the key 602 so as to obtain afixed ID 603. The host device stores the fixedID 603 in the secretinformation processing portion 105. - Next, this encrypted device unique ID generating process will be described along the flow chart of
FIG. 7 . - First, the encrypted fixed
ID 601 stored in theFLASH 110 in advance is read. The encrypted fixedID 601 is decrypted with the key 602 by the secretinformation processing portion 105 inFIG. 1 . Thus, the fixedID 603 is obtained. In a hashcalculation processing step 606, the host device calculates thehash value 607 from thechange field information 604 stored in the storage portion of the host device. The host device compares theaforementioned hash value 605 with thehash value 607 in a hashvalue comparing step 608. When the two values are equal to each other, the host device stores thechange field information 604 in the secretinformation processing portion 105. On the other hand, when the two hash values are different from each other, the sequence is terminated abnormally. - When it is concluded in the hash
value comparing step 608 that thehash value 605 and thehash value 607 are equal to each other, the host device acquires auser ID 609 from theexternal device 103 inFIG. 1 and stores theuser ID 609 in theRAM 108. In anintegration processing step 610, the host device uses the secretinformation processing portion 105 inFIG. 1 not only to generate a deviceunique ID 611 from the decryptedfixed ID 603, thechange field information 604 stored in the secretinformation processing portion 105 and theuser ID 609, but also to generate a device uniqueID generating flag 613. - The host device stores the generated device
unique ID 611 and the generated device uniqueID generating flag 613 in the secretinformation processing portion 105. Here, the host device uses the secretinformation processing portion 105 inFIG. 1 to encrypt the generated deviceunique ID 611 with the key 602 so as to obtain an encrypted deviceunique ID 612. The encrypted deviceunique ID 612 obtained thus is stored in theFLASH 110. - Here, the key 602 used to decrypt the encrypted fixed ID does not have to be the same as the key 602 used to encrypt the device unique ID. In addition, the fixed ID or the change field information does not have to be encrypted as long as access thereto from any unauthorized external device or the like can be blocked.
- In
FIG. 7 , the key 602, the fixedID 603, thechange field information 604, the deviceunique ID 611 and the device uniqueID generating flag 613 are stored in the secretinformation processing portion 105. The encrypted fixedID 601, thechange field information 604, thehash value 605 and the encrypted deviceunique ID 612 are stored in theFLASH 110. Theuser ID 609 acquired from the external device is stored in theRAM 108. - According to the encrypted device unique ID generating process in this Example, only the user ID is input from the external device while the change field information and the hash value are stored in the host device in advance. Thus, procedure and management are simplified. In addition, when the change field information is falsified from the outside such as an external device, the falsification can be detected.
- (Encrypted Device Unique ID Generating Process 3)
-
FIG. 9 shows a data flow (Example 3) of the encrypted device uniqueID generating process 207 in the flow chart ofFIG. 3 .FIG. 9 represents a method for acquiring only a user ID from the external device while providing encrypted change field information in the host device in advance. - The host device has an encrypted fixed
ID 701, encryptedchange field information 704, and a key 702 for decrypting the encrypted fixed ID and the encrypted change field information. When the host device reads the encrypted fixedID 701 stored in theFLASH 110 inFIG. 1 , the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encrypted fixedID 701 with the key 702 so as to obtain afixed ID 703. The fixedID 703 obtained thus is stored in the secretinformation processing portion 105. - When the host device then reads the encrypted
change field information 704 stored in theFLASH 110 inFIG. 1 , the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encryptedchange field information 704 with the key 702 so as to obtainchange field information 705. Thechange field information 705 obtained thus is stored in the secretinformation processing portion 105. - The host device acquires a
user ID 706 from theexternal device 103 inFIG. 1 and stores theuser ID 706 in theFLASH 110. Anintegration processing step 707 is executed by the secretinformation processing portion 105 inFIG. 1 so that a deviceunique ID 708 and a device uniqueID generating flag 710 are generated from the fixedID 703, thechange field information 705 and theuser ID 706. - The device
unique ID 708 and the device uniqueID generating flag 710 generated thus are stored in the secretinformation processing portion 105. Here, the host device uses the secretinformation processing portion 105 inFIG. 1 to encrypt the generated deviceunique ID 708 with the key 702 so as to obtain an encrypted deviceunique ID 709. The encrypted deviceunique ID 709 obtained thus is stored in theFLASH 110. - Here, the key 702 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 702 used to encrypt the device unique ID. In addition, the fixed ID or the change field information does not have to be encrypted as long as access thereto from any unauthorized external device or the like can be blocked.
- In
FIG. 9 , the key 702, the fixedID 703, thechange field information 705, the deviceunique ID 708 and the device uniqueID generating flag 710 are stored in the secretinformation processing portion 105. The encrypted fixedID 701, the encryptedchange field information 704 and the encrypted deviceunique ID 709 are stored in theFLASH 110. Theuser ID 706 acquired from the external device is stored in theRAM 108. - According to the encrypted device unique ID generating process in this Example, only the user ID is input from the external device while the encrypted change field information is provided in the host device in advance. Thus, procedure and management are simplified. In addition, even if the encrypted change field information can be read from the outside such as an external device, the change field information can be prevented from being browsed because the change field information is encrypted.
- (Encrypted Device Unique ID Generating Process 4)
-
FIG. 10 shows a data flow (Example 4) of the encrypted device uniqueID generating process 207 in the flow chart ofFIG. 3 .FIG. 10 represents a method for acquiring change field information and a user ID from the external device. - The host device has a key 802 for decrypting an encrypted fixed
ID 801 and encrypting a device unique ID. When the host device reads the encrypted fixedID 801 stored in theFLASH 110 inFIG. 1 , the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encrypted fixedID 801 with the key 802 so as to obtain afixed ID 803. The fixedID 803 obtained thus is stored in the secretinformation processing portion 105. - The host device acquires
change field information 804 and auser ID 805 from theexternal device 103 inFIG. 1 and stores them in theFLASH 110. In anintegration processing step 806, the host device uses the secretinformation processing portion 105 inFIG. 1 to generate a deviceunique ID 807 and a device uniqueID generating flag 809 from the fixedID 803, thechange field information 804 and theuser ID 805. The deviceunique ID 807 and the device uniqueID generating flag 809 generated thus are stored in the secretinformation processing portion 105. Here, the host device uses the secretinformation processing portion 105 inFIG. 1 to encrypt the generated deviceunique ID 807 with the key 802 so as to obtain an encrypted deviceunique ID 808. The encrypted deviceunique ID 808 obtained thus is stored in theFLASH 110. Here, the key 802 used to decrypt the encrypted fixed ID does not have to be the same as the key 802 used to encrypt the device unique ID. - In
FIG. 10 , thekeys 802, the fixedID 803, thechange field information 804, the deviceunique ID 807 and the device uniqueID generating flag 809 are stored in the secretinformation processing portion 105. The encrypted fixedID 801 and the encrypted deviceunique ID 808 are stored in theFLASH 110. Theuser ID 805 acquired from the external device and thechange field information 804 acquired from the external device are stored in theRAM 108. - According to the encrypted device unique ID generating process in this Example, the change field information can be set from the external device effectively, for example, in setting a plurality of user IDs.
- (Encrypted Device Unique ID Generating Process 5)
-
FIG. 11 shows a data flow (Example 5) of the encrypted device uniqueID generating process 207 in the flow chart ofFIG. 3 .FIG. 11 represents a method for acquiring change field information, a hash value of the change field information and a user ID from the external device. - The host device has a key 902 for decrypting an encrypted fixed
ID 901 and encrypting a device unique ID. (The key 902 is also used for encryption as will be described later.) When the host device reads the encrypted fixedID 901 stored in theFLASH 110 inFIG. 1 , the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encrypted fixedID 901 with the key 902 so as to obtain afixed ID 903. The fixedID 903 obtained thus is stored in the secretinformation processing portion 105. - The host device acquires
change field information 904 and ahash value 905 of the change field information from theexternal device 103. In astep 906 for calculating the hash value of the acquiredchange field information 904, the host device calculates ahash value 907. In a hashvalue comparing step 908, the host device compares thehash value 907 with thehash value 905 acquired from the external device. When falsification of thechange field information 904 is not detected, the host device stores thechange field information 904 in the secretinformation processing portion 105 inFIG. 1 . On the other hand, when falsification of thechange field information 904 is detected, the sequence is terminated abnormally. - The host device then acquires a
user ID 909 from theexternal device 103 and stores theuser ID 909 in theRAM 108. In anintegration processing step 910, the host device uses the secretinformation processing portion 105 inFIG. 1 to generate a deviceunique ID 911 and a device uniqueID generating flag 913 from the fixedID 903, thechange field information 904 and theuser ID 909. The deviceunique ID 911 and the device uniqueID generating flag 913 generated thus are stored in the secretinformation processing portion 105. Here, the host device uses the secretinformation processing portion 105 inFIG. 1 to encrypt the generated deviceunique ID 911 with the key 902 so as to obtain an encrypted deviceunique ID 912. The encrypted deviceunique ID 912 obtained thus is stored in theFLASH 110. Here, the key 902 used to decrypt the encrypted fixed ID does not have to be the same as the key 902 used to encrypt the device unique ID. - In
FIG. 11 , the key 902, the fixedID 903, thechange field information 904 regarded as not falsified, thehash value 907, the deviceunique ID 911 and the device uniqueID generating flag 913 are stored in the secretinformation processing portion 105. The encrypted fixedID 901 and the encrypted deviceunique ID 912 are stored in theFLASH 110. Theuser ID 909 acquired from the external device, thechange field information 904 acquired from the external device and thehash value 905 of thechange field information 904 acquired from the external device are stored in theRAM 108. - According to the encrypted device unique ID generating process in this Example, the change field information and the hash value of the change field information are acquired from the external device. It is therefore possible to detect falsification of the change field information.
- (Encrypted Device Unique ID Generating Process 6)
-
FIG. 12 shows a data flow (Example 6) of the encrypted device uniqueID generating process 207 in the flow chart ofFIG. 3 .FIG. 12 represents a method for acquiring encrypted change field information and a user ID from the external device. - The host device has an encrypted fixed
ID 1001, and a key 1002 used to decrypt the encrypted fixed ID and encrypted change field information and to encrypt a deviceunique ID 1008. When the host device reads the encrypted fixedID 1001 stored in theFLASH 110 inFIG. 1 , the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encrypted fixedID 1001 with the key 1002 so as to obtain a fixedID 1003. The fixedID 1003 obtained thus is stored in the secretinformation processing portion 105. - The host device acquires encrypted
change field information 1004 from theexternal device 103 and stores the encryptedchange field information 1004 in theRAM 108. When the host device reads the encryptedchange field information 1004 stored in theRAM 108, the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encryptedchange field information 1004 with the key 1002 so as to obtainchange field information 1005. Thechange field information 1005 obtained thus is stored in the secretinformation processing portion 105. - Then, the host device acquires a
user ID 1006 from theexternal device 103 and stores theuser ID 1006 in theRAM 108. In anintegration processing step 1007, the host device uses the secretinformation processing portion 105 inFIG. 1 to generate a deviceunique ID 1008 and a device uniqueID generating flag 1010 from the fixedID 1003, thechange field information 1005 and theuser ID 1006. The deviceunique ID 1008 and the device uniqueID generating flag 1010 generated thus are stored in the secretinformation processing portion 105. Here, the host device uses the secretinformation processing portion 105 inFIG. 1 to encrypt the generated deviceunique ID 1008 with the key 1002 so as to obtain an encrypted deviceunique ID 1009. The encrypted deviceunique ID 1009 obtained thus is stored in theFLASH 110. - Here, the key 1002 used to decrypt the encrypted fixed ID does not have to be the same as the key 1002 used to encrypt the device unique ID. Further, the key used to decrypt the encrypted fixed ID, the key used to encrypt the device unique ID and the key used to decrypt the encrypted change field information may be totally different from one another.
- In
FIG. 12 , the key 1002, the fixedID 1003, thechange field information 1005, the deviceunique ID 1008 and the device uniqueID generating flag 1010 are stored in the secretinformation processing portion 105. The encrypted fixedID 1001 and the encrypted deviceunique ID 1009 are stored in theFLASH 110. Theuser ID 1006 acquired from the external device and the encryptedchange field information 1004 acquired from the external device are stored in theRAM 108. - According to the encrypted device unique ID generating process in this Example, the encrypted change field information and the user ID are acquired from the external device. It is therefore possible to hide the change field information.
- (Encrypted Device Unique ID Generating Process 7)
-
FIG. 13 shows a data flow (Example 7) of the encrypted device uniqueID generating process 207 in the flow chart ofFIG. 3 .FIG. 13 represents a method for acquiring a user ID and a hash value of the user ID from the external device. - The host device has an encrypted fixed
ID 1101, and a key 1102 for decrypting encryptedchange field information 1104 and the encrypted fixed ID and for encrypting a deviceunique ID 1112. When the host device reads the encrypted fixedID 1101 stored in theFLASH 110 inFIG. 1 , the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encrypted fixedID 1101 with the key 1102 so as to obtain a fixedID 1103. The fixedID 1103 obtained thus is stored in the secretinformation processing portion 105. - When the host device then reads the encrypted
change field information 1104 stored in theFLASH 110 inFIG. 1 , the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encryptedchange field information 1104 with the key 1102 so as to obtainchange field information 1105. Thechange field information 1105 obtained thus is stored in the secretinformation processing portion 105. - The host device acquires a
user ID 1106 and ahash value 1107 of the user ID from theexternal device 103. In astep 1108 for calculating the hash value of the acquireduser ID 1106, the host device calculates ahash value 1109. In a hashvalue comparing step 1110, the host device compares thehash value 1107 with thehash value 1109. When falsification of theuser ID 1106 is not detected, the host device stores theuser ID 1106 in the secretinformation processing portion 105 inFIG. 1 . On the other hand, when falsification of theuser ID 1106 is detected, the sequence is terminated abnormally. - In an
integration processing step 1111, the host device uses the secretinformation processing portion 105 inFIG. 1 to generate a deviceunique ID 1112 and a device uniqueID generating flag 1114 from the fixedID 1103, thechange field information 1105 and theuser ID 1106. The deviceunique ID 1112 and the device uniqueID generating flag 1114 generated thus are stored in the secretinformation processing portion 105. Here, the host device uses the secretinformation processing portion 105 inFIG. 1 to encrypt the generated deviceunique ID 1112 with the key 1102 so as to obtain an encrypted deviceunique ID 1113. The encrypted deviceunique ID 1113 obtained thus is stored in theFLASH 110. - Here, the key 1102 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 1102 used to encrypt the device unique ID. Further, any one of the methods described with reference to FIGS. 6 to 12 may be used as the method for setting the change field information.
- In
FIG. 13 , the key 1102, the fixedID 1103, thechange field information 1105, theuser ID 1106, the deviceunique ID 1112 and the device uniqueID generating flag 1114 are stored in the secretinformation processing portion 105. The encrypted fixedID 1101, the encryptedchange field information 1104 and the encrypted deviceunique ID 1113 are stored in theFLASH 110. Theuser ID 1106 acquired from the external device and thehash value 1107 of theuser ID 1106 acquired from the external device are stored in theRAM 108. - According to the encrypted device unique ID generating process in this Example, the user ID and the hash value of the user ID are acquired from the external device. It is therefore possible to detect falsification of the user ID.
- (Encrypted Device Unique ID Generating Process 8)
-
FIG. 14 shows a data flow (Example 8) of the encrypted device uniqueID generating process 207 in the flow chart ofFIG. 3 .FIG. 14 represents a method for acquiring an encrypted user ID from the external device.FIG. 15 is a block diagram showing the configuration of this system. The configuration ofFIG. 15 is the same as that of Example 2 inFIG. 8 , except that an encrypted user ID is generated from a key KB and a user ID by anID converter 151 in thekey management mechanism 121, and introduced into the external I/F portion of thehost device 102, and that a calculated hash value of the change field information is not compared with an embedded one of the change field information in order to prevent falsification but change field information is embedded as plain text in the host device. The other configuration is formed in the same manner as in Example 2 inFIG. 8 . Therefore, detailed description thereof will be omitted here. The host device has an encrypted fixedID 1201, changefield information 1205, and a key 1202 for decrypting an encrypted user ID and for encrypting a device unique ID. - When the host device reads the encrypted fixed
ID 1201 stored in theFLASH 110 inFIG. 1 , the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encrypted fixedID 1201 with the key 1202 so as to obtain a fixedID 1203. The fixedID 1203 obtained thus is stored in the secretinformation processing portion 105. - Then, the host device reads the
change field information 1205 stored in theFLASH 110 inFIG. 1 . - The host device acquires an
encrypted user ID 1206 from theexternal device 103 and stores theencrypted user ID 1206 in theRAM 108. When the host device reads theencrypted user ID 1206 stored in theRAM 108, the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt theencrypted user ID 1206 with the key 1202 so as to obtain auser ID 1207. Theuser ID 1207 obtained thus is stored in the secretinformation processing portion 1205. - In an
integration processing step 1208, the host device uses the secretinformation processing portion 105 inFIG. 1 to generate a deviceunique ID 1209 and a device uniqueID generating flag 1211 from the fixedID 1203, thechange field information 1205 and theuser ID 1207. The deviceunique ID 1209 and the device uniqueID generating flag 1211 generated thus are stored in the secretinformation processing portion 105. Here, the host device uses the secretinformation processing portion 105 inFIG. 1 to encrypt the generated deviceunique ID 1209 with the key 1202 so as to obtain an encrypted deviceunique ID 1210. The encrypted deviceunique ID 1210 obtained thus is stored in theFLASH 110. - Here, the key 1202 used to decrypt the encrypted fixed ID does not have to be the same as the key 1202 used to encrypt the device unique ID. Further, any one of the methods described with reference to FIGS. 6 to 12 may be used the method for setting the change field information.
- In
FIG. 14 , the key 1202, the fixedID 1203, thechange field information 1205, theuser ID 1207, the deviceunique ID 1209 and the device uniqueID generating flag 1211 are stored in the secretinformation processing portion 105. The encrypted fixedID 1201, the encryptedchange field information 1205 and the encrypted deviceunique ID 1210 are stored in theFLASH 110. Theencrypted user ID 1206 acquired from the external device is stored in theRAM 108. - According to the encrypted device unique ID generating process in this Example, the encrypted user ID is acquired from the external device. It is therefore possible to hide the user ID.
- (Encrypted Device Unique ID Generating Process 9)
-
FIG. 16 shows a data flow (Example 9) of the encrypted device uniqueID generating process 207 in the flow chart ofFIG. 3 .FIG. 16 represents a method for controlling the number-of-times-of-change. The host device has an encrypted fixedID 1301, encryptedchange field information 1304, a key 1302 for decrypting the encrypted fixed ID and the encrypted change field information and for encrypting a device unique ID, and number-of-times-of-change control information 1309. - When the host device reads the encrypted fixed
ID 1301 stored in theFLASH 110 inFIG. 1 , the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encrypted fixedID 1301 with the key 1302 so as to obtain a fixedID 1303. The fixedID 1303 obtained thus is stored in the secretinformation processing portion 105. - When the host device then reads the encrypted
change field information 1304 stored in theFLASH 110 inFIG. 1 , the host device uses the secretinformation processing portion 105 inFIG. 1 to decrypt the encryptedchange field information 1304 with the key 1302 so as to obtainchange field information 1305. Thechange field information 1305 obtained thus is stored in the secretinformation processing portion 105. - The host device acquires an
encrypted user ID 1306 from theexternal device 103 and stores theencrypted user ID 1306 in theRAM 108. In a number-of-times-of-changeinformation updating step 1307, the host device updates number-of-times-ofchange information 1308. In a number-of-times determining step 1310, the host device compares the number-of-times-of-change information 1308 with number-of-times-of-change control information 1309 set in the host device in advance. When the number-of-times-of-change information 1308 does not exceed the number-of-times-of-change control information 1309, the secretinformation processing portion 105 inFIG. 1 generates a deviceunique ID 1312 and a device uniqueID generating flag 1314 from the fixedID 1303, thechange field information 1305 and theuser ID 1306 in anintegration processing step 1311. - The device
unique ID 1312 and the device uniqueID generating flag 1314 generated thus are stored in the secretinformation processing portion 105. Here, the host device uses the secretinformation processing portion 105 inFIG. 1 to encrypt the generated deviceunique ID 1312 with the key 1302 so as to obtain an encrypted deviceunique ID 1313. The encrypted deviceunique ID 1313 obtained thus is stored in theRAM 108. When the number-of-times-of-change information 1308 exceeds the number-of-times-of-change control information 1309 in the number-of-times determining step 1310, the sequence is terminated abnormally. - Here, the key 1302 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 1302 used to encrypt the device unique ID. Further, any one of the methods described with reference to FIGS. 6 to 14 may be used as the method for setting the change field information and the user ID.
- In
FIG. 16 , the key 1302, the fixedID 1303, thechange field information 1305, theuser ID 1306, the deviceunique ID 1312, the device uniqueID generating flag 1314, the number-of-times-of-change control information 1309 and the number-of-times-of-change information 1308 are stored in the secretinformation processing portion 105. The encrypted fixedID 1301, the encryptedchange field information 1304 and the encrypted deviceunique ID 1313 are stored in theFLASH 110. Theuser ID 1306 acquired from the external device is stored in theRAM 108. - According to the encrypted device unique ID generating process in this Example, it is possible to control the number of times with which the device unique ID has been updated.
- (Device Unique Secret Key Generating Process 1)
-
FIG. 17 shows, as Example 10, a data flow (1) of the device unique secretkey generating process 206 in the flow chart ofFIG. 3 . The host device has a key 1402 for decrypting a device unique ID. - An encrypted device
unique ID 1401 obtained by any one of the methods described with reference to FIGS. 6 to 16 is read from theFLASH 110 inFIG. 1 , and decrypted with the key 1402 by the secretinformation processing portion 105. Thus, a deviceunique ID 1403 is obtained. The deviceunique ID 1403 obtained thus is stored in the secretinformation processing portion 105. - In an
illegality detecting step 1405, it is determined whether there is or not an illegal attempt to generate a device unique secret key from a device uniqueID generating flag 1404 and the deviceunique ID 1403 obtained by any one of the methods described with reference to FIGS. 6 to 16. When there is no illegal attempt, an authentication process is performed between the host device ofFIG. 4 and the target device. When the mutual authentication succeeds, anauthentication key 402 is generated and bound with the deviceunique ID 1403 in a device unique secretkey generating step 1406. Thus, a device unique secret key 1407 is obtained. The device unique secret key 1407 obtained thus is stored in the secretinformation processing portion 105. - The host device decrypts contents with the obtained device unique secret key 1407. For example, encrypted contents data received from the
external device 103 are decrypted with the device unique secret key 1407 stored in theFLASH 110, and stored in a predetermined contents data storage unit. Thus, a user can use the contents data. - In
FIG. 17 , the key 1402, the deviceunique ID 1403, the device uniqueID generating flag 1404, theauthentication key 1402 and the device unique secret key 1407 are stored in the secretinformation processing portion 105. The encrypted deviceunique ID 1401 is stored in theFLASH 110. - According to the device unique secret key generating step in this Example, it is possible to detect an illegal ID. For example, the device unique secret key is not generated when the phone number is not registered.
- Example 11 of the invention will be described below.
- In the system in Example 8 shown in
FIG. 15 , an encrypted user ID is generated from a key KB and a user ID by theID converter 151 in thekey management mechanism 121 and introduced into the external I/F of thehost device 102. In this Example shown inFIG. 19 , a raw user ID is input into the host device through the external I/F (112). - That is, as shown in
FIG. 19 , in Example 11, the secret information processing portion of the host device uses anencryption circuit 116 to encrypt a device unique ID generated by anintegration circuit 115 with a key K3, so as to generate an encrypted device unique ID. The secret information processing portion of the host device stores this encrypted device unique ID in the storage portion of the host device through anoutput control circuit 134. The encrypted device unique ID is input from the storage portion of the host device to the secret information processing portion of the host device through the I/F again. The secret information processing portion of the host device uses adecryption circuit 118 to decrypt the encrypted device unique ID with a key K4 so as to generate the device unique ID to thereby generate a device unique key KI by use of an authentication key KS. - On the other hand, a user ID input from the outside of the host device through the external IF 112 is compared with a user ID portion of the decrypted device unique ID by a
comparison circuit 133. When the input user ID does not coincide with the user ID portion, theoutput control circuit 134 regards the user ID as unauthorized, and suspends a subsequent encryption/decryption process. - Further, the encrypted device unique ID is decrypted by the
decryption circuit 118 and separated by aseparation circuit 191. A user ID obtained thus is compared with an initial value of the user ID by acomparison circuit 192. When the user ID coincides with the initial value of the user ID, the user ID is regarded as not updated, and the sequence is terminated abnormally. Further, the user ID is compared with a user ID input from the external device by acomparison circuit 193. When the result of the comparison indicates that the user IDs do not coincide with each other, an encryption/decryption process is controlled by acontrol circuit 119 so as to terminate the sequence abnormally. The configuration on the upstream side of the comparison circuits inFIG. 19 is the same as that inFIG. 2 . Constituents the same as those inFIG. 2 are referenced correspondingly and description thereof will be omitted. - When an encrypted fixed ID and a plaintext user ID are input in
FIG. 19 , a fixed ID and an initial value of the user ID are decrypted with a key K2 in thedecryption circuit 113. - Based on change field information IF, the fixed ID and the user ID are integrated by the
integration circuit 115. The encrypted device unique ID is decrypted with the key K2 by thedecryption circuit 113 and separated into the fixed ID portion and the user ID portion by aseparation circuit 114. - The user ID input to the host device in the aforementioned manner and the initial value of the user ID registered in the host device in advance are compared with each other by the
comparison circuit 133. The integrated device unique ID is encrypted again with the key K3 by theencryption circuit 116. - When the output of the
comparison circuit 133 indicates that the input user ID does not coincide with the initial value of the registered user ID, theoutput control circuit 134 performs control not to output an encrypted device unique ID (SID). - Otherwise, the output control circuit generates an encrypted device unique ID (SID).
- At the same time, the initial value of the decrypted user ID and a value attached to the secret information processing portion in advance are compared with each other by the
comparison circuit 192. When the result of the comparison in thecomparison circuit 192 indicates that the two values coincide with each other, the encryption/decryptionprocessing control circuit 119 does not output a device unique secret key. Only when the comparison result indicates that the two values do not coincide with each other, the encryption/decryptionprocessing control circuit 119 outputs a device unique secret key. That is, there is fear that an unregistered user ID would be decrypted if the user ID were used as it is. Therefore, it is checked here whether the user ID has been registered or not. Since determination is made based on the comparison with the information of the initial value in the aforementioned manner, security can be further enhanced. - The encrypted device unique ID output when the
comparison circuit 133 concludes that the user ID coincides with the initial value of the user ID is then input into the secret information processing portion again and decrypted with the key K4 by thedecryption circuit 118. An authentication secret key generated based on mutual authentication between the host device and the target device and a device unique ID are input to a device unique keygeneration processing circuit 117. Thus, a device unique key (device unique secret key) KI is generated. - In parallel with this, a user ID is separated from the device unique ID generated in the secret information processing portion by the
separation circuit 191, and compared with the value attached to the secret information processing portion in advance by thecomparison circuit 192. When the comparison result indicates that the separated user ID coincides with the attached value, reset etc. is executed so that a subsequent encryption/decryption process is prevented from being performed. When the comparison result indicates that the separated user ID does not coincide with the attached value, the user ID is regarded as normal, and the subsequent encryption/decryption process is allowed to be performed. Then, a user ID input from the outside is compared with the user ID separated by theseparation circuit 191 by acomparison circuit 193. When the comparison result indicates that the two user IDs do not coincide with each other, reset etc. is executed so that a subsequent encryption/decryption process is prevented from being performed. When the comparison result indicates that the two user IDs coincide with each other, the user ID is regarded as normal, and the subsequent encryption/decryption process is allowed to be performed. -
FIG. 20 shows Example 12 of the invention in which a user ID acquired from the external device by the host device is encrypted by anencryption circuit 161 using a desired key, and stored in the outside of thesecret information LSI 111, by way of example.FIG. 20 is characterized in that the encrypted user ID input into the secret information LSI is integrated with a fixed ID and change field information by anintegration circuit 115. That is,FIG. 20 is characterized in that the secret information processing portion designed to encrypt the aforementioned device unique ID so as to generate an encrypted device unique ID does not decrypt an encrypted user ID input from the outside of the host device through the IF but integrates the encrypted user ID with a fixed ID in theintegration circuit 115 by use of change field information so as to generate a device unique ID. - The other configuration is formed in the same manner as that in Example 11. In
FIG. 20 , constituents similar to and the same as those inFIG. 2 are referenced correspondingly and description thereof will be omitted. - According to this configuration, the user ID is encrypted with a desired key and stored in a hidden state into the outside of the
secret information LSI 111. Since the encrypted user ID is read and integrated with the fixed ID and the change field information, the hidden state of the user ID can be kept easily. - Accordingly, even if the user ID is known, the device unique key cannot be generated by use of a raw user ID because the user ID is encrypted by the
encryption circuit 161. -
FIG. 21 shows Example 13 of the invention. Example 13 is different from Example 11 in that an encrypted user ID is input. In this manner, input of an unauthorized encrypted device unique ID does not lead to operation. Thus, illegal access can be prevented. - In terms of the circuit configuration, Example 13 is different from Example 11 in that an encrypted user ID is input from the external device to a
decryption circuit 194 of the secret information LSI of thehost device 102. Here, the user ID encrypted by theID converter 151 of the key management mechanism is decrypted with a key K5 by adecryption circuit 194 in the secret information LSI of the host device, and integrated with a fixed ID and change field information by anintegration circuit 115 in the same manner as in Example 11. - In this manner, the user ID is encrypted so that the user ID can be hidden more surely accordingly.
-
FIG. 18 shows a block configuration for contents distribution in which ahost device 102, atarget device 101, anexternal device 103 and acontents provider 113 are provided according to Embodiment 2 of the invention. Thecontents provider 113 can communicate with an external I/F portion 112 of thehost device 102. - According to the embodiment, when the
host device 102 downloads a ringing tone etc., ahost CPU 106 gives an instruction to asecret information LSI 111 so that thesecret information LSI 111 performs data exchange with thecontents provider 113 through the external I/F portion 112 in the same manner as data exchange with thetarget device 101. In this manner, thecontents provider 113 can be protected. -
FIG. 18 shows the whole outline of data exchange including a key management mechanism.FIG. 18 is correspondent to the encrypted device unique ID generating process (1) inFIG. 6 . - Next, Embodiment 3 of the invention will be described.
FIGS. 22A to 22D show configurations of a device unique ID according to Embodiment 3 of the invention. In theaforementioned Embodiment 1, the user ID portion which has not been updated includes all Os. The device unique ID encrypted at the time of generation of the device unique key is decrypted, and the user ID portion is separated from the decrypted device unique ID by the separation circuit. Determination as to whether the user ID portion has been updated correctly or not is based on the determination as to whether the user ID portion includes all Os or not. On the other hand, this embodiment is characterized in that a determination flag as to whether updating has been performed correctly or not is included in a device unique ID.FIGS. 22A to 22D are explanatory views showing configurations of the device unique ID and change field information. The device unique ID is generated by the key management mechanism. As shown inFIG. 22A , the device unique ID includes two IDs (i.e. a fixedID 301 and a user ID 302) and aflag FLAG 0 added ahead of the fixedID 301. The other configuration is the same as that in theaforementioned Embodiment 1. That is, the fixedID 301 is secret information determined before the host device is registered or replaced. The user ID is user-dependent information such as a phone number. The user ID is an ID which can be changed when the host device is registered or replaced. - That is, the device unique ID is roughly constituted by three parts, i.e. a determination flag region, a
fixed ID 301 and auser ID 304. When the determination flag region is provided in the device unique ID, it is possible to determine whether the user ID has been updated correctly or not. The determination flag region may contain one bit or a plurality of bits. The determination flag region is used only as a determination flag. The device unique key generating method based on a device unique ID constituted by the fixed ID and the user ID excluding the determination flag region may be used in a device unique key generating process. - As shown in
FIG. 22A , the device unique ID is constituted by the two IDs (i.e. the fixedID 301 and the user ID 302) and theflag FLAG 0 added ahead of the fixedID 301. The other configuration is the same as that in theaforementioned Embodiment 1. That is, the fixedID 301 is secret information determined before the host device is registered or replaced. The user ID is user-dependent information such as a phone number. The user ID is an ID which can be changed when the host device is registered or replaced. - The device unique ID is formed by the key management mechanism so that a flag region is provided ahead of a fixed ID. The device unique ID where a user ID has not yet been registered has a configuration in which the fixed
ID 301 and auser ID 303 are encrypted as shown inFIG. 22B . In theuser ID 303, a user ID field which should be set when a user ID is registered is defined as a desired value. The device unique ID where a user ID has been registered has a configuration in which the fixedID 301 and auser ID 304 are encrypted as shown inFIG. 22C . When the user ID is registered thus,FLAG 1 is generated. - Change field information defines a field of the device unique ID in which the user ID should be put in the same manner as in the aforementioned embodiment. For example, as shown in
FIG. 22D , FLAG is first formed and fields of the device unique ID are then configured to indicate a start point and an end point of the user ID. For example, assume that an a-th bit and a b-th bit from the head of the device unique ID are the start point and the end point of the user ID respectively. In this case, the change field information is (a, b). In the change field information, the same data as the fixed ID may be placed repeatedly before and after the user ID or the user ID may be inserted into the field of the fixed ID. When the fields are changed thus based on the change field information, a large number of device unique IDs can be generated in accordance with the layout of the fixed ID and the user ID. Thus, a device unique ID which is extremely complicated and is hardly decrypted can be obtained so that the protectability of the device unique ID can be enhanced greatly. - The encrypted device unique ID is decrypted when a device unique key is generated. In this event, the flag is checked to determine whether the device unique ID has been updated correctly or not. When the flag has been asserted, the device unique key is generated. When the flag has not been asserted, processing is suspended to prevent the device unique key from being generated.
-
FIG. 23 shows Example 14 of the invention. - In a system shown in
FIG. 23 , in akey management mechanism 121, a device unique ID having a determination flag region added thereto is generated and encrypted with a key K1 so that an encrypted device unique ID (IDE1) is generated. Key information for opening the encrypted device unique ID (IDE1) is given to a key K2 of asecret information LSI 111 of ahost device 102 in advance. When a user ID is to be integrated with a device unique ID (ID0), the device unique ID (ID0) is decrypted with the key K2 by adecryption circuit 113, and separated into a determination flag region, a fixed ID portion (IDF) and a user ID portion (IDc0) by aseparation circuit 114. Here, a user ID (IDu1) is integrated with the determination flag region and the fixed ID portion (IDF) by anintegration circuit 115 based on the change field information. In the determination flag region, a determination flag indicating that the user ID has been updated is asserted. The device unique ID obtained thus is encrypted with a key K3. The encrypted device unique ID (SID) is stored in a storage portion of the host device. - The encrypted device unique ID (SID) is input to the
secret information LSI 111 again and decrypted with a key K4 by adecryption circuit 118. A flag determination region is separated from the decrypted device unique ID by aseparation circuit 195. The determination flag region is checked by aflag determination circuit 194. When the determination flag has not been asserted correctly, the processing is terminated abnormally. When the determination flag has been asserted, a device uniquekey generating process 117 is executed to generate a device unique key KI. - In this Example, when the encrypted device unique ID is decrypted to generate a device unique key, the flag is checked to determine the device unique ID has been updated correctly or not. When the flag has been asserted, the device unique key is generated. When the flag has not been asserted, processing is suspended to prevent the device unique key from being generated.
- The same method as that described in
Embodiment 1 may be used as the method for inputting change field information and a user ID in this Example. As for control of the number of times with which the device unique ID has been changed, the method described inEmbodiment 1 may be combined likewise. - According to the embodiment, a determination flag region is defined in a device unique ID. Accordingly, input of an unauthorized encrypted device unique ID does not lead to operation. Thus, illegal access can be prevented.
- The invention is applicable to a system for registration or model change of portable phones etc. because of very high security and simple management.
Claims (40)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JPP2005-079465 | 2005-03-18 | ||
JP2005079465 | 2005-03-18 | ||
JP2005195213A JP2006295872A (en) | 2005-03-18 | 2005-07-04 | Formation method of device-dependent key, confidential information lsi equipped with secret information function using the method, host equipment using the lsi, record medium with authentication function used for the host equipment, and mobile terminal with recording medium equipped with authentication function |
JPP2005195213 | 2005-07-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060248346A1 true US20060248346A1 (en) | 2006-11-02 |
Family
ID=37235825
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/377,278 Abandoned US20060248346A1 (en) | 2005-03-18 | 2006-03-17 | Method for generating device unique key, secret information LSI with secret information processing function using the method, host device mounted with the LSI, recording medium with authentication function used in the host device, and portable terminal with the recording medium having authentication function |
Country Status (2)
Country | Link |
---|---|
US (1) | US20060248346A1 (en) |
JP (1) | JP2006295872A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100036772A1 (en) * | 2008-08-08 | 2010-02-11 | France Telecom | Secure electronic coupon delivery to mobile device |
US20110133911A1 (en) * | 2009-12-09 | 2011-06-09 | Honda Motor Co., Ltd. | Antitheft apparatus for equipment with prime mover |
US20110161672A1 (en) * | 2009-12-31 | 2011-06-30 | Martinez Alberto J | Provisioning, upgrading, and/or changing of hardware |
US8370648B1 (en) * | 2010-03-15 | 2013-02-05 | Emc International Company | Writing and reading encrypted data using time-based encryption keys |
CN103427984A (en) * | 2012-05-24 | 2013-12-04 | 三星电子株式会社 | Apparatus for generating secure key using device ID and user authentication information |
US20140108821A1 (en) * | 2012-10-16 | 2014-04-17 | James Lloyd | Trusted Data Relay |
US9237074B1 (en) * | 2013-05-08 | 2016-01-12 | Amazon Technologies, Inc. | Distributed identifier generation system |
US9935768B2 (en) | 2012-08-06 | 2018-04-03 | Samsung Electronics Co., Ltd. | Processors including key management circuits and methods of operating key management circuits |
US10200196B1 (en) | 2018-04-25 | 2019-02-05 | Blockchain Asics Llc | Cryptographic ASIC with autonomous onboard permanent storage |
US10262164B2 (en) | 2016-01-15 | 2019-04-16 | Blockchain Asics Llc | Cryptographic ASIC including circuitry-encoded transformation function |
US10372943B1 (en) | 2018-03-20 | 2019-08-06 | Blockchain Asics Llc | Cryptographic ASIC with combined transformation and one-way functions |
US10445727B1 (en) * | 2007-10-18 | 2019-10-15 | Jpmorgan Chase Bank, N.A. | System and method for issuing circulation trading financial instruments with smart features |
NL2021222B1 (en) * | 2018-07-02 | 2020-01-07 | Helder Ip B V | Method for secure encrypted digital services |
US20210144016A1 (en) * | 2019-11-07 | 2021-05-13 | Krohne Messtechnik Gmbh | Method for Carrying Out Permission-Dependent Communication Between at Least one Field Device of Automation Technology and an Operating Device |
US11057208B2 (en) * | 2016-08-22 | 2021-07-06 | Rakuten, Inc. | Management system, management device, management method, program, and non-transitory computer-readable information recording medium |
US20220231838A1 (en) * | 2021-01-15 | 2022-07-21 | Micron Technology, Inc. | Server System to Control Memory Devices over Computer Networks |
US11483148B2 (en) | 2021-01-15 | 2022-10-25 | Micron Technology, Inc. | Batch transfer of control of memory devices over computer networks |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5564242B2 (en) * | 2009-12-24 | 2014-07-30 | 株式会社日立製作所 | Biometric authentication system |
JP5593133B2 (en) * | 2010-06-16 | 2014-09-17 | 株式会社メガチップス | Information management system, terminal device, and operation method of terminal device |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020174360A1 (en) * | 2000-06-29 | 2002-11-21 | Kiyokazu Ikeda | Service providing system |
US20030005309A1 (en) * | 2001-06-27 | 2003-01-02 | Ripley Michael S. | Discouraging unauthorized redistribution of protected content by cryptographically binding the content to individual authorized recipients |
US20030009102A1 (en) * | 2001-04-19 | 2003-01-09 | Sonosite, Inc. | Medical diagnostic ultrasound instrument with ECG module, authorization mechanism and methods of use |
US20030046570A1 (en) * | 2001-08-07 | 2003-03-06 | Nokia Corporation | Method for processing information in an electronic device, a system, an electronic device and a processing block |
US20030095664A1 (en) * | 2000-04-04 | 2003-05-22 | Tomoyuki Asano | Information recording/playback apparatus and method |
US20040123127A1 (en) * | 2002-12-18 | 2004-06-24 | M-Systems Flash Disk Pioneers, Ltd. | System and method for securing portable data |
US20040187018A1 (en) * | 2001-10-09 | 2004-09-23 | Owen William N. | Multi-factor authentication system |
US20040249768A1 (en) * | 2001-07-06 | 2004-12-09 | Markku Kontio | Digital rights management in a mobile communications environment |
US20050021539A1 (en) * | 2003-03-07 | 2005-01-27 | Chaticom, Inc. | Methods and systems for digital rights management of protected content |
US20050021959A1 (en) * | 2003-06-30 | 2005-01-27 | Tsunehito Tsushima | Communication system, communication method, base station apparatus, controller, device, and recording medium storing control program |
US20050091509A1 (en) * | 2003-10-27 | 2005-04-28 | Harald Herberth | Method for identifying, authenticating and authorizing a user of protected data |
US20050114689A1 (en) * | 2003-10-23 | 2005-05-26 | Microsoft Corporation | Encryption and data-protection for content on portable medium |
US20050257055A1 (en) * | 2004-04-28 | 2005-11-17 | Anderson Eric C | Device ownership transfer from a network |
US6970562B2 (en) * | 2000-12-19 | 2005-11-29 | Tricipher, Inc. | System and method for crypto-key generation and use in cryptosystem |
US20060095454A1 (en) * | 2004-10-29 | 2006-05-04 | Texas Instruments Incorporated | System and method for secure collaborative terminal identity authentication between a wireless communication device and a wireless operator |
US7296147B2 (en) * | 2002-06-11 | 2007-11-13 | Matsushita Electric Industrial Co., Ltd. | Authentication system and key registration apparatus |
US7596703B2 (en) * | 2003-03-21 | 2009-09-29 | Hitachi, Ltd. | Hidden data backup and retrieval for a secure device |
US7770226B2 (en) * | 2003-09-30 | 2010-08-03 | Inka Entworks, Inc. | Method of synchronizing data between contents providers and a portable device via network and a system thereof |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU633011B2 (en) * | 1988-06-28 | 1993-01-21 | La Jolla Cancer Research Foundation | Suppression of cell proliferation by decorin |
JPH02120901A (en) * | 1988-10-31 | 1990-05-08 | Mitsubishi Electric Corp | Programmable controller |
JP3788056B2 (en) * | 1998-08-07 | 2006-06-21 | カシオ計算機株式会社 | Electronic still camera |
JP2003152696A (en) * | 2001-11-08 | 2003-05-23 | Nippon Hoso Kyokai <Nhk> | Meta-data transmitting method, meta-data receiving method, meta-data transmitting device, meta-data receiving device, meta-data transmitting program and meta-data receiving program |
JP4414172B2 (en) * | 2002-08-28 | 2010-02-10 | パナソニック株式会社 | Content replication management system and network device |
JP2005051508A (en) * | 2003-07-29 | 2005-02-24 | Yaskawa Electric Corp | Ieee 1394 network system |
-
2005
- 2005-07-04 JP JP2005195213A patent/JP2006295872A/en active Pending
-
2006
- 2006-03-17 US US11/377,278 patent/US20060248346A1/en not_active Abandoned
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030095664A1 (en) * | 2000-04-04 | 2003-05-22 | Tomoyuki Asano | Information recording/playback apparatus and method |
US7181624B2 (en) * | 2000-04-04 | 2007-02-20 | Sony Corporation | Information recording/playback apparatus and method |
US20020174360A1 (en) * | 2000-06-29 | 2002-11-21 | Kiyokazu Ikeda | Service providing system |
US20100262364A1 (en) * | 2000-06-29 | 2010-10-14 | Sony Corporation | Service providing system |
US6970562B2 (en) * | 2000-12-19 | 2005-11-29 | Tricipher, Inc. | System and method for crypto-key generation and use in cryptosystem |
US20030009102A1 (en) * | 2001-04-19 | 2003-01-09 | Sonosite, Inc. | Medical diagnostic ultrasound instrument with ECG module, authorization mechanism and methods of use |
US20030005309A1 (en) * | 2001-06-27 | 2003-01-02 | Ripley Michael S. | Discouraging unauthorized redistribution of protected content by cryptographically binding the content to individual authorized recipients |
US20040249768A1 (en) * | 2001-07-06 | 2004-12-09 | Markku Kontio | Digital rights management in a mobile communications environment |
US20030046570A1 (en) * | 2001-08-07 | 2003-03-06 | Nokia Corporation | Method for processing information in an electronic device, a system, an electronic device and a processing block |
US20040187018A1 (en) * | 2001-10-09 | 2004-09-23 | Owen William N. | Multi-factor authentication system |
US7296147B2 (en) * | 2002-06-11 | 2007-11-13 | Matsushita Electric Industrial Co., Ltd. | Authentication system and key registration apparatus |
US20040123127A1 (en) * | 2002-12-18 | 2004-06-24 | M-Systems Flash Disk Pioneers, Ltd. | System and method for securing portable data |
US20050021539A1 (en) * | 2003-03-07 | 2005-01-27 | Chaticom, Inc. | Methods and systems for digital rights management of protected content |
US7596703B2 (en) * | 2003-03-21 | 2009-09-29 | Hitachi, Ltd. | Hidden data backup and retrieval for a secure device |
US20050021959A1 (en) * | 2003-06-30 | 2005-01-27 | Tsunehito Tsushima | Communication system, communication method, base station apparatus, controller, device, and recording medium storing control program |
US7770226B2 (en) * | 2003-09-30 | 2010-08-03 | Inka Entworks, Inc. | Method of synchronizing data between contents providers and a portable device via network and a system thereof |
US20050114689A1 (en) * | 2003-10-23 | 2005-05-26 | Microsoft Corporation | Encryption and data-protection for content on portable medium |
US20050091509A1 (en) * | 2003-10-27 | 2005-04-28 | Harald Herberth | Method for identifying, authenticating and authorizing a user of protected data |
US20050257055A1 (en) * | 2004-04-28 | 2005-11-17 | Anderson Eric C | Device ownership transfer from a network |
US20060095454A1 (en) * | 2004-10-29 | 2006-05-04 | Texas Instruments Incorporated | System and method for secure collaborative terminal identity authentication between a wireless communication device and a wireless operator |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10445727B1 (en) * | 2007-10-18 | 2019-10-15 | Jpmorgan Chase Bank, N.A. | System and method for issuing circulation trading financial instruments with smart features |
US11100487B2 (en) * | 2007-10-18 | 2021-08-24 | Jpmorgan Chase Bank, N.A. | System and method for issuing, circulating and trading financial instruments with smart features |
US10102509B2 (en) * | 2008-08-08 | 2018-10-16 | Orange | Secure electronic coupon delivery to mobile device |
US20100036772A1 (en) * | 2008-08-08 | 2010-02-11 | France Telecom | Secure electronic coupon delivery to mobile device |
US20110133911A1 (en) * | 2009-12-09 | 2011-06-09 | Honda Motor Co., Ltd. | Antitheft apparatus for equipment with prime mover |
US8305202B2 (en) * | 2009-12-09 | 2012-11-06 | Honda Motor Co., Ltd. | Antitheft apparatus for equipment with prime mover |
US20110161672A1 (en) * | 2009-12-31 | 2011-06-30 | Martinez Alberto J | Provisioning, upgrading, and/or changing of hardware |
US8966657B2 (en) * | 2009-12-31 | 2015-02-24 | Intel Corporation | Provisioning, upgrading, and/or changing of hardware |
US8370648B1 (en) * | 2010-03-15 | 2013-02-05 | Emc International Company | Writing and reading encrypted data using time-based encryption keys |
US9152814B1 (en) * | 2010-03-15 | 2015-10-06 | Emc International Company | Writing and reading encrypted data using time-based encryption keys |
CN103427984A (en) * | 2012-05-24 | 2013-12-04 | 三星电子株式会社 | Apparatus for generating secure key using device ID and user authentication information |
US9935768B2 (en) | 2012-08-06 | 2018-04-03 | Samsung Electronics Co., Ltd. | Processors including key management circuits and methods of operating key management circuits |
US20140108821A1 (en) * | 2012-10-16 | 2014-04-17 | James Lloyd | Trusted Data Relay |
US9235731B2 (en) * | 2012-10-16 | 2016-01-12 | Truedata Systems, Inc. | Trusted data relay |
US9237074B1 (en) * | 2013-05-08 | 2016-01-12 | Amazon Technologies, Inc. | Distributed identifier generation system |
US10936758B2 (en) | 2016-01-15 | 2021-03-02 | Blockchain ASICs Inc. | Cryptographic ASIC including circuitry-encoded transformation function |
US10262164B2 (en) | 2016-01-15 | 2019-04-16 | Blockchain Asics Llc | Cryptographic ASIC including circuitry-encoded transformation function |
US11057208B2 (en) * | 2016-08-22 | 2021-07-06 | Rakuten, Inc. | Management system, management device, management method, program, and non-transitory computer-readable information recording medium |
US10885228B2 (en) | 2018-03-20 | 2021-01-05 | Blockchain ASICs Inc. | Cryptographic ASIC with combined transformation and one-way functions |
US10372943B1 (en) | 2018-03-20 | 2019-08-06 | Blockchain Asics Llc | Cryptographic ASIC with combined transformation and one-way functions |
US11093654B2 (en) * | 2018-04-25 | 2021-08-17 | Blockchain ASICs Inc. | Cryptographic ASIC with self-verifying unique internal identifier |
US11042669B2 (en) | 2018-04-25 | 2021-06-22 | Blockchain ASICs Inc. | Cryptographic ASIC with unique internal identifier |
US10607030B2 (en) | 2018-04-25 | 2020-03-31 | Blockchain Asics Llc | Cryptographic ASIC with onboard permanent context storage and exchange |
US10607032B2 (en) | 2018-04-25 | 2020-03-31 | Blockchain Asics Llc | Cryptographic ASIC for key hierarchy enforcement |
US10607031B2 (en) | 2018-04-25 | 2020-03-31 | Blockchain Asics Llc | Cryptographic ASIC with autonomous onboard permanent storage |
US10796024B2 (en) | 2018-04-25 | 2020-10-06 | Blockchain ASICs Inc. | Cryptographic ASIC for derivative key hierarchy |
US10262163B1 (en) | 2018-04-25 | 2019-04-16 | Blockchain Asics Llc | Cryptographic ASIC with unique internal identifier |
US10256974B1 (en) | 2018-04-25 | 2019-04-09 | Blockchain Asics Llc | Cryptographic ASIC for key hierarchy enforcement |
US10200196B1 (en) | 2018-04-25 | 2019-02-05 | Blockchain Asics Llc | Cryptographic ASIC with autonomous onboard permanent storage |
US11093655B2 (en) | 2018-04-25 | 2021-08-17 | Blockchain ASICs Inc. | Cryptographic ASIC with onboard permanent context storage and exchange |
US10404454B1 (en) | 2018-04-25 | 2019-09-03 | Blockchain Asics Llc | Cryptographic ASIC for derivative key hierarchy |
US10404463B1 (en) * | 2018-04-25 | 2019-09-03 | Blockchain Asics Llc | Cryptographic ASIC with self-verifying unique internal identifier |
NL2021222B1 (en) * | 2018-07-02 | 2020-01-07 | Helder Ip B V | Method for secure encrypted digital services |
US20210144016A1 (en) * | 2019-11-07 | 2021-05-13 | Krohne Messtechnik Gmbh | Method for Carrying Out Permission-Dependent Communication Between at Least one Field Device of Automation Technology and an Operating Device |
US20220231838A1 (en) * | 2021-01-15 | 2022-07-21 | Micron Technology, Inc. | Server System to Control Memory Devices over Computer Networks |
US11483148B2 (en) | 2021-01-15 | 2022-10-25 | Micron Technology, Inc. | Batch transfer of control of memory devices over computer networks |
US11917059B2 (en) | 2021-01-15 | 2024-02-27 | Lodestar Licensing Group Llc | Batch transfer of control of memory devices over computer networks |
Also Published As
Publication number | Publication date |
---|---|
JP2006295872A (en) | 2006-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20060248346A1 (en) | Method for generating device unique key, secret information LSI with secret information processing function using the method, host device mounted with the LSI, recording medium with authentication function used in the host device, and portable terminal with the recording medium having authentication function | |
CN104025500B (en) | Secure key storage using physically unclonable functions | |
KR101574618B1 (en) | Recordingreproducing system recording medium device and recordingreproducing device | |
US7325139B2 (en) | Information processing device, method, and program | |
JP5556895B2 (en) | Content data reproducing apparatus, update management method, and update management program | |
US7949877B2 (en) | Rights enforcement and usage reporting on a client device | |
JP4857123B2 (en) | Unauthorized device detection apparatus, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method | |
KR100883480B1 (en) | An Information Processing Method and Recording Media | |
US20080025503A1 (en) | Security method using self-generated encryption key, and security apparatus using the same | |
JP2009282525A (en) | Content security method providing long-term renewable security, device for the same, and computer-readable storage medium | |
MXPA06010778A (en) | Digital rights management structure, portable storage device, and contents management method using the portable storage device. | |
JPWO2005096158A1 (en) | Usage authentication method, usage authentication program, information processing apparatus, and recording medium | |
JP2006115329A (en) | Data transfer system and data transferring method | |
US9047445B2 (en) | Memory device and method for updating a security module | |
WO2015042981A1 (en) | Encryption and decryption processing method, apparatus and device | |
WO2001052474A1 (en) | Authentication communication device and authentication communication system | |
MX2007008543A (en) | Device and method for digital rights management. | |
JP6146476B2 (en) | Information processing apparatus and information processing method | |
CN103914662A (en) | Access control method and device of file encrypting system on the basis of partitions | |
JP2000076063A (en) | System and device for certification and recording medium | |
US8261076B2 (en) | Method and device for agreeing shared key between first communication device and second communication device | |
JP2002244989A (en) | Device driver operating method | |
CN103370718A (en) | Data protection using distributed security key | |
JP2009223766A (en) | Copy protect method, content reproduction device and ic chip | |
JP2001306401A (en) | Authentication communication device and its system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD., JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHIOMI, KENTARO;FUJIWARA, MAKOTO;REEL/FRAME:018309/0295 Effective date: 20060210 |
|
AS | Assignment |
Owner name: PANASONIC CORPORATION, JAPAN Free format text: CHANGE OF NAME;ASSIGNOR:MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.;REEL/FRAME:021897/0671 Effective date: 20081001 Owner name: PANASONIC CORPORATION,JAPAN Free format text: CHANGE OF NAME;ASSIGNOR:MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.;REEL/FRAME:021897/0671 Effective date: 20081001 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |